GLSA Bodhisattva
Joined: 25 Feb 2003 Posts: 3829 Location: Essen, Germany
|
Posted: Wed Dec 15, 2004 11:13 am Post subject: [ GLSA 200412-09 ] ncpfs: Buffer overflow in ncplogin and nc |
|
|
Gentoo Linux Security Advisory
Title: ncpfs: Buffer overflow in ncplogin and ncpmap (GLSA 200412-09)
Severity: high
Exploitable: local
Date: December 15, 2004
Bug(s): #72820
ID: 200412-09
Synopsis
ncpfs is vulnerable to a buffer overflow that could lead to local execution of arbitrary code with elevated privileges.
Background
ncpfs is a NCP protocol network filesystem that allows access to Netware services, for example to mount volumes of NetWare servers or print to NetWare print queues.
Affected Packages
Package: net-fs/ncpfs
Vulnerable: < 2.2.5
Unaffected: >= 2.2.5
Architectures: All supported architectures
Description
Karol Wiesek discovered a buffer overflow in the handling of the '-T' option in the ncplogin and ncpmap utilities, which are both installed as SUID root by default.
Impact
A local attacker could trigger the buffer overflow by calling one of these utilities with a carefully crafted command line, potentially resulting in execution of arbitrary code with root privileges.
Workaround
There is no known workaround at this time.
Resolution
All ncpfs users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-fs/ncpfs-2.2.5" |
References
Full Disclosure Advisory
CAN-2004-1079
Last edited by GLSA on Sun May 07, 2006 4:54 pm; edited 1 time in total |
|