[ GLSA 200405-15 ] cadaver heap-based buffer overflow

From: Thierry Carrez (koon_at_gentoo.org)
Date: 05/20/04

  • Next message: morning_wood: "[Full-Disclosure] ActivePerl Perl2Exe [was] Buffer Overflow in ActivePerl ?"
    Date: Thu, 20 May 2004 20:55:07 +0200
    To: gentoo-announce@lists.gentoo.org
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 200405-15
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                                http://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

      Severity: Normal
         Title: cadaver heap-based buffer overflow
          Date: May 20, 2004
          Bugs: #51461
            ID: 200405-15

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    There is a heap-based buffer overflow vulnerability in the neon library
    used in cadaver, possibly leading to execution of arbitrary code when
    connected to a malicious server.

    Background
    ==========

    cadaver is a command-line WebDAV client.

    Affected packages
    =================

        -------------------------------------------------------------------
         Package / Vulnerable / Unaffected
        -------------------------------------------------------------------
      1 net-misc/cadaver <= 0.22.1 >= 0.22.2

    Description
    ===========

    Stefan Esser discovered a vulnerability in the code of the neon library
    (see GLSA 200405-13). This library is also included in cadaver.

    Impact
    ======

    When connected to a malicious WebDAV server, this vulnerability could
    allow remote execution of arbitrary code with the rights of the user
    running cadaver.

    Workaround
    ==========

    There is no known workaround at this time. All users are advised to
    upgrade to the latest available version of cadaver.

    Resolution
    ==========

    All users of cadaver should upgrade to the latest stable version:

        # emerge sync

        # emerge -pv ">=net-misc/cadaver-0.22.2"
        # emerge ">=net-misc/cadaver-0.22.2"

    References
    ==========

      [ 1 ] CAN-2004-0398
            http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398
      [ 2 ] GLSA 200405-13
            http://www.gentoo.org/security/en/glsa/glsa-200405-13.xml

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

         http://security.gentoo.org/glsa/glsa-200405-15.xml

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users machines is of utmost
    importance to us. Any security concerns should be addressed to
    security@gentoo.org or alternatively, you may file a bug at
    http://bugs.gentoo.org.

    License
    =======

    Copyright 2004 Gentoo Technologies, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    http://creativecommons.org/licenses/by-sa/1.0

    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.4 (GNU/Linux)
    Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

    iD8DBQFArP8LvcL1obalX08RAoGaAKCgj0T5gwgllRkrHKXHWMK6P7kyDQCfe0ZN
    UnHOFtHw+wNG29yS6+zy+aw=
    =z8Wi
    -----END PGP SIGNATURE-----


  • Next message: morning_wood: "[Full-Disclosure] ActivePerl Perl2Exe [was] Buffer Overflow in ActivePerl ?"

    Relevant Pages