Joined: 12 May 2004
|Posted: Thu Aug 24, 2006 7:26 pm Post subject: [ GLSA 200608-23 ] Heartbeat: Denial of Service
|Gentoo Linux Security Advisory
Title: Heartbeat: Denial of Service (GLSA 200608-23)
Date: August 24, 2006
Updated: September 22, 2006
Heartbeat is vulnerable to a Denial of Service which can be triggered by a remote attacker without authentication.
Heartbeat is a component of the High-Availability Linux project. It is used to perform death-of-node detection, communications and cluster management.
Vulnerable: < 2.0.7
Unaffected: >= 2.0.7
Unaffected: >= 1.2.5 < 1.2.6
Architectures: All supported architectures
Yan Rong Ge discovered that the peel_netstring() function in cl_netstring.c does not validate the "length" parameter of user input, which can lead to an out-of-bounds memory access when processing certain Heartbeat messages (CVE-2006-3121). Furthermore an unspecified local DoS issue was fixed (CVE-2006-3815).
By sending a malicious UDP Heartbeat message, even before authentication, a remote attacker can crash the master control process of the cluster.
There is no known workaround at this time.
All Heartbeat users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose sys-cluster/heartbeat
Last edited by GLSA on Thu Oct 09, 2008 4:18 am; edited 5 times in total