Gentoo Archives: gentoo-announce

From: Alex Legler <a3li@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 201201-18 ] bip: Multiple vulnerabilities
Date: Mon, 30 Jan 2012 13:07:10
Message-Id: 201201301345.03036.a3li@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201201-18
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: bip: Multiple vulnerabilities
9 Date: January 30, 2012
10 Bugs: #336321, #400599
11 ID: 201201-18
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities in bip might allow remote unauthenticated
19 attackers to cause a Denial of Service or possibly execute arbitrary
20 code.
21
22 Background
23 ==========
24
25 bip is a multi-user IRC proxy with SSL support.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 net-irc/bip < 0.8.8-r1 >= 0.8.8-r1
34
35 Description
36 ===========
37
38 Multiple vulnerabilities have been discovered in bip:
39
40 * Uli Schlachter reported that bip does not properly handle invalid
41 data during authentication, resulting in a daemon crash
42 (CVE-2010-3071).
43 * Julien Tinnes reported that bip does not check the number of open
44 file descriptors against FD_SETSIZE, resulting in a stack buffer
45 overflow (CVE-2012-0806).
46
47 Impact
48 ======
49
50 A remote attacker could exploit these vulnerabilities to execute
51 arbitrary code with the privileges of the user running the bip daemon,
52 or cause a Denial of Service condition.
53
54 Workaround
55 ==========
56
57 There is no known workaround at this time.
58
59 Resolution
60 ==========
61
62 All bip users should upgrade to the latest version:
63
64 # emerge --sync
65 # emerge --ask --oneshot --verbose ">=net-irc/bip-0.8.8-r1"
66
67 NOTE: The CVE-2010-3071 flaw was already corrected in an earlier
68 version of bip and is included in this advisory for completeness.
69
70 References
71 ==========
72
73 [ 1 ] CVE-2010-3071
74 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3071
75 [ 2 ] CVE-2012-0806
76 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0806
77
78 Availability
79 ============
80
81 This GLSA and any updates to it are available for viewing at
82 the Gentoo Security Website:
83
84 http://security.gentoo.org/glsa/glsa-201201-18.xml
85
86 Concerns?
87 =========
88
89 Security is a primary focus of Gentoo Linux and ensuring the
90 confidentiality and security of our users' machines is of utmost
91 importance to us. Any security concerns should be addressed to
92 security@g.o or alternatively, you may file a bug at
93 https://bugs.gentoo.org.
94
95 License
96 =======
97
98 Copyright 2012 Gentoo Foundation, Inc; referenced text
99 belongs to its owner(s).
100
101 The contents of this document are licensed under the
102 Creative Commons - Attribution / Share Alike license.
103
104 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature