From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-200410-08.xml | 73 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 73 insertions(+) create mode 100644 metadata/glsa/glsa-200410-08.xml (limited to 'metadata/glsa/glsa-200410-08.xml') diff --git a/metadata/glsa/glsa-200410-08.xml b/metadata/glsa/glsa-200410-08.xml new file mode 100644 index 000000000000..12dac3bb3cbd --- /dev/null +++ b/metadata/glsa/glsa-200410-08.xml @@ -0,0 +1,73 @@ + + + + ncompress: Buffer overflow + + compress and uncompress, which could be used by daemon programs, contain a + buffer overflow that could lead to remote execution of arbitrary code with + the rights of the daemon process. + + ncompress + 2004-10-09 + 2006-05-22: 02 + 66251 + remote + + + 4.2.4-r1 + 4.2.4 + + + +

+ ncompress is a utility handling compression and decompression of + Lempel-Ziv archives, compatible with the original *nix compress and + uncompress utilities (.Z extensions). +

+
+ +

+ compress and uncompress do not properly check bounds on command line + options, including the filename. Large parameters would trigger a + buffer overflow. +

+
+ +

+ By supplying a carefully crafted filename or other option, an attacker + could execute arbitrary code on the system. A local attacker could only + execute code with his own rights, but since compress and uncompress are + called by various daemon programs, this might also allow a remote + attacker to execute code with the rights of the daemon making use of + ncompress. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ All ncompress users should upgrade to the latest version: +

+ + # emerge sync + + # emerge -pv ">=app-arch/ncompress-4.2.4-r1" + # emerge ">=app-arch/ncompress-4.2.4-r1" +
+ + US-CERT Vulnerability Note VU#176363 + CVE-2001-1413 + + + koon + + + koon + + + koon + +
-- cgit v1.2.3