Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200710-01 ] RPCSEC_GSS library: Buffer overflow
Date: Thu, 04 Oct 2007 22:11:16
Message-Id: 47055F13.2040307@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200710-01
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: High
11 Title: RPCSEC_GSS library: Buffer overflow
12 Date: October 04, 2007
13 Bugs: #191479
14 ID: 200710-01
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 A buffer overflow vulnerability has been discovered in librpcsecgss.
22
23 Background
24 ==========
25
26 librpcsecgss is an implementation of RPCSEC_GSS for secure RPC
27 communications.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 net-libs/librpcsecgss < 0.16 >= 0.16
36
37 Description
38 ===========
39
40 A stack based buffer overflow has been discovered in the
41 svcauth_gss_validate() function in file lib/rpc/svc_auth_gss.c when
42 processing an overly long string in a RPC message.
43
44 Impact
45 ======
46
47 A remote attacker could send a specially crafted RPC request to an
48 application relying on this library, e.g NFSv4 or Kerberos
49 (GLSA-200709-01), resulting in the execution of arbitrary code with the
50 privileges of the user running the application.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time.
56
57 Resolution
58 ==========
59
60 All librpcsecgss users should upgrade to the latest version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose ">=net-libs/librpcsecgss-0.16"
64
65 References
66 ==========
67
68 [ 1 ] CVE-2007-3999
69 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999
70 [ 2 ] GLSA-200709-01
71 http://www.gentoo.org/security/en/glsa/glsa-200709-01.xml
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 http://security.gentoo.org/glsa/glsa-200710-01.xml
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 http://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2007 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.5
100 -----BEGIN PGP SIGNATURE-----
101 Version: GnuPG v1.4.7 (GNU/Linux)
102 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
103
104 iD8DBQFHBV8SuhJ+ozIKI5gRAnlrAJ9JirMsZLbV84pfiUSMlrRKsegWwACeP6+6
105 TdRzktElA4nj+G1wK9gqtz4=
106 =/FBW
107 -----END PGP SIGNATURE-----
108 --
109 gentoo-announce@g.o mailing list