lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3FD09747.7010607@mpex.net>
Date: Fri, 05 Dec 2003 15:33:43 +0100
From: Gregor Lawatscheck <gpel@...x.net>
To: bugtraq@...urityfocus.com
Subject: [Fwd: Security Alert; possible buffer overflow in all Mathopd versions]


-------- Original Message --------
Subject: Security Alert; possible buffer overflow in all Mathopd versions
Date: Thu, 4 Dec 2003 22:33:26 +0100 (CET)
From: Michiel Boland <michiel@...and.org>
To: mathopd@...hopd.org

Hi.

During some testing, I came across a rather stupid and embarassing buffer
overflow in request.c in all Mathopd versions up to and including 1.5b13.
The problem is in the prepare_reply() function that allocates space for a
buffer on the stack that may be too small for whatever goes into it. This
can lead to crashes, or even system compromise. I am amazed that nobody
has spotted the problem before; obviously not many people are using this
software. :}

Anyway, I have patched things up now so that things should be ok.

Read the table below for any action that you must take if you run mathopd.
The table informs you, for each particular version, whether it is
vulnerable to remote exploits of this bug, and whether an upgrade exists,
and which one you should use.

Branch/Version   Status
---------------------------------------------------------------------
1.2 and older    Probably vulnerable, not supported
1.3 before pl8   Probably vulnerable, upgrade advised
1.3pl8           Patched, otherwise not supported (use 1.4p2 instead)
1.4 before p2    Definitely vulnerable, upgrade immediately to 1.4p2
1.4p2            Not vulnerable

BETA versions:

1.5 before b14   Vulnerable
1.5b14           Not vulnerable
---------------------------------------------------------------------

In short: all versions in the 1.3, 1.4 and current branch are fixed (at
least for this particular problem.) If you run 1.3 at this moment, you may
be all right, but it is probably wise to upgrade anyway. If you run 1.4
right now you are in trouble; please upgrade as soon as possible.

The patched versions are available for immediate download on the Mathopd
website.

Sorry about this. This has not been a good week.

Cheers
Michiel










Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ