Joined: 12 May 2004
|Posted: Mon Jun 26, 2006 8:26 pm Post subject: [ GLSA 200606-25 ] Hashcash: Possible heap overflow
|Gentoo Linux Security Advisory
Title: Hashcash: Possible heap overflow (GLSA 200606-25)
Date: June 26, 2006
Updated: July 29, 2006
A heap overflow vulnerability in the Hashcash utility could allow an
attacker to execute arbitrary code.
Hashcash is a utility for generating Hashcash tokens, a proof-of-work
system to reduce the impact of spam.
Vulnerable: < 1.21
Unaffected: >= 1.21
Architectures: All supported architectures
Andreas Seltenreich has reported a possible heap overflow in the
array_push() function in hashcash.c, as a result of an incorrect amount
of allocated memory for the "ARRAY" structure.
By sending malicious entries to the Hashcash utility, an attacker may
be able to cause an overflow, potentially resulting in the execution of
arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
All Hashcash users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/hashcash-1.21"
Last edited by GLSA on Wed Mar 12, 2014 4:23 am; edited 3 times in total