Gentoo Archives: gentoo-announce

From: Robert Buchholz <rbu@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200712-18 ] Multi-Threaded DAAP Daemon: Multiple vulnerabilities
Date: Sat, 29 Dec 2007 15:11:22
Message-Id: 200712291500.01521.rbu@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200712-18
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: Multi-Threaded DAAP Daemon: Multiple vulnerabilities
9 Date: December 29, 2007
10 Bugs: #200110
11 ID: 200712-18
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities in the web server in the Multi-Threaded DAAP
19 Daemon may lead to the remote execution of arbitrary code.
20
21 Background
22 ==========
23
24 Multi-Threaded DAAP Daemon (mt-daapd), also known as the Firefly Media
25 Server, is a software to serve digital music to the Roku Soundbridge
26 and Apple's iTunes.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 media-sound/mt-daapd < 0.2.4.1 >= 0.2.4.1
35
36 Description
37 ===========
38
39 nnp discovered multiple vulnerabilities in the XML-RPC handler in the
40 file webserver.c. The ws_addarg() function contains a format string
41 vulnerability, as it does not properly sanitize username and password
42 data from the "Authorization: Basic" HTTP header line (CVE-2007-5825).
43 The ws_decodepassword() and ws_getheaders() functions do not correctly
44 handle empty Authorization header lines, or header lines without a ':'
45 character, leading to NULL pointer dereferences (CVE-2007-5824).
46
47 Impact
48 ======
49
50 A remote attacker could send specially crafted HTTP requests to the web
51 server in the Multi-Threaded DAAP Daemon, possibly leading to the
52 execution of arbitrary code with the privileges of the user running the
53 web server or a Denial of Service.
54
55 Workaround
56 ==========
57
58 There is no known workaround at this time.
59
60 Resolution
61 ==========
62
63 All Multi-Threaded DAAP Daemon users should upgrade to the latest
64 version:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=media-sound/mt-daapd-0.2.4.1"
68
69 References
70 ==========
71
72 [ 1 ] CVE-2007-5824
73 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5824
74 [ 2 ] CVE-2007-5825
75 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5825
76
77 Availability
78 ============
79
80 This GLSA and any updates to it are available for viewing at
81 the Gentoo Security Website:
82
83 http://security.gentoo.org/glsa/glsa-200712-18.xml
84
85 Concerns?
86 =========
87
88 Security is a primary focus of Gentoo Linux and ensuring the
89 confidentiality and security of our users machines is of utmost
90 importance to us. Any security concerns should be addressed to
91 security@g.o or alternatively, you may file a bug at
92 http://bugs.gentoo.org.
93
94 License
95 =======
96
97 Copyright 2007 Gentoo Foundation, Inc; referenced text
98 belongs to its owner(s).
99
100 The contents of this document are licensed under the
101 Creative Commons - Attribution / Share Alike license.
102
103 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature