GLSA Bodhisattva
Joined: 13 Jun 2003 Posts: 4087 Location: Dresden, Germany
|
Posted: Thu May 20, 2004 7:36 pm Post subject: [ GLSA 200405-15 ] cadaver heap-based buffer overflow |
|
|
Gentoo Linux Security Advisory
Title: cadaver heap-based buffer overflow (GLSA 200405-15)
Severity: normal
Exploitable: remote
Date: May 20, 2004
Bug(s): #51461
ID: 200405-15
Synopsis
There is a heap-based buffer overflow vulnerability in the neon library
used in cadaver, possibly leading to execution of arbitrary code when
connected to a malicious server.
Background
cadaver is a command-line WebDAV client.
Affected Packages
Package: net-misc/cadaver
Vulnerable: <= 0.22.1
Unaffected: >= 0.22.2
Architectures: All supported architectures
Description
Stefan Esser discovered a vulnerability in the code of the neon library
(see GLSA 200405-13). This library is also included in cadaver.
Impact
When connected to a malicious WebDAV server, this vulnerability could allow
remote execution of arbitrary code with the rights of the user running
cadaver.
Workaround
There is no known workaround at this time. All users are advised to upgrade
to the latest available version of cadaver.
Resolution
All users of cadaver should upgrade to the latest stable version:
Code: | # emerge sync
# emerge -pv ">=net-misc/cadaver-0.22.2"
# emerge ">=net-misc/cadaver-0.22.2" |
References
CAN-2004-0398
GLSA 200405-13
Last edited by GLSA on Mon Jun 10, 2013 4:16 am; edited 2 times in total |
|