Joined: 25 Feb 2003
Location: Essen, Germany
|Posted: Wed Dec 15, 2004 11:13 am Post subject: [ GLSA 200412-09 ] ncpfs: Buffer overflow in ncplogin and nc
|Gentoo Linux Security Advisory
Title: ncpfs: Buffer overflow in ncplogin and ncpmap (GLSA 200412-09)
Date: December 15, 2004
ncpfs is vulnerable to a buffer overflow that could lead to local execution of arbitrary code with elevated privileges.
ncpfs is a NCP protocol network filesystem that allows access to Netware services, for example to mount volumes of NetWare servers or print to NetWare print queues.
Vulnerable: < 2.2.5
Unaffected: >= 2.2.5
Architectures: All supported architectures
Karol Wiesek discovered a buffer overflow in the handling of the '-T' option in the ncplogin and ncpmap utilities, which are both installed as SUID root by default.
A local attacker could trigger the buffer overflow by calling one of these utilities with a carefully crafted command line, potentially resulting in execution of arbitrary code with root privileges.
There is no known workaround at this time.
All ncpfs users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-fs/ncpfs-2.2.5"
Full Disclosure Advisory
Last edited by GLSA on Sun May 07, 2006 4:54 pm; edited 1 time in total