Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200504-29 ] Pound: Buffer overflow vulnerability
Date: Sat, 30 Apr 2005 14:33:47
Message-Id: 4273974A.7070806@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200504-29
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: Pound: Buffer overflow vulnerability
9 Date: April 30, 2005
10 Bugs: #90851
11 ID: 200504-29
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Pound is vulnerable to a buffer overflow that could lead to the remote
19 execution of arbitrary code.
20
21 Background
22 ==========
23
24 Pound is a reverse proxy, load balancer and HTTPS front-end.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 www-servers/pound < 1.8.3 >= 1.8.3
33
34 Description
35 ===========
36
37 Steven Van Acker has discovered a buffer overflow vulnerability in the
38 "add_port()" function in Pound.
39
40 Impact
41 ======
42
43 A remote attacker could send a request for an overly long hostname
44 parameter, which could lead to the remote execution of arbitrary code
45 with the rights of the Pound daemon process (by default, Gentoo uses
46 the "nobody" user to run the Pound daemon).
47
48 Workaround
49 ==========
50
51 There is no known workaround at this time.
52
53 Resolution
54 ==========
55
56 All Pound users should upgrade to the latest version:
57
58 # emerge --sync
59 # emerge --ask --oneshot --verbose ">=www-servers/pound-1.8.3"
60
61 References
62 ==========
63
64 [ 1 ] Original announcement
65
66 http://www.apsis.ch/pound/pound_list/archive/2005/2005-04/1114516112000
67
68 Availability
69 ============
70
71 This GLSA and any updates to it are available for viewing at
72 the Gentoo Security Website:
73
74 http://security.gentoo.org/glsa/glsa-200504-29.xml
75
76 Concerns?
77 =========
78
79 Security is a primary focus of Gentoo Linux and ensuring the
80 confidentiality and security of our users machines is of utmost
81 importance to us. Any security concerns should be addressed to
82 security@g.o or alternatively, you may file a bug at
83 http://bugs.gentoo.org.
84
85 License
86 =======
87
88 Copyright 2005 Gentoo Foundation, Inc; referenced text
89 belongs to its owner(s).
90
91 The contents of this document are licensed under the
92 Creative Commons - Attribution / Share Alike license.
93
94 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature