Gentoo Archives: gentoo-announce

From: Kurt Lieber <klieber@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200404-14 ] Multiple format string vulnerabilities in cadaver
Date: Mon, 19 Apr 2004 09:23:25
Message-Id: 20040419091455.GW16487@mail.lieber.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200404-14
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Multiple format string vulnerabilities in cadaver
9
10 Date: April 19, 2004
11 Bugs: #47799
12 ID: 200404-14
13
14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
15
16 Synopsis
17 ========
18
19 There are multiple format string vulnerabilities in the neon library
20 used in cadaver, possibly leading to execution of arbitrary code when
21 connected to a malicious server.
22
23 Background
24 ==========
25
26 According to http://www.webdav.org/cadaver, cadaver is a command-line
27 WebDAV client for Unix. It supports file upload, download, on-screen
28 display, namespace operations (move/copy), collection creation and
29 deletion, and locking operations.
30
31 Affected packages
32 =================
33
34 -------------------------------------------------------------------
35 Package / Vulnerable / Unaffected
36 -------------------------------------------------------------------
37 net-misc/cadaver < 0.22.1 >= 0.22.1
38
39 Description
40 ===========
41
42 Cadaver code includes the neon library, which in versions 0.24.4 and
43 previous is vulnerable to multiple format string attacks. The latest
44 version of cadaver uses version 0.24.5 of the neon library, which makes
45 it immune to this vulnerability.
46
47 Impact
48 ======
49
50 When using cadaver to connect to an untrusted WebDAV server, this
51 vulnerability can allow a malicious remote server to execute arbitrary
52 code on the client with the rights of the user using cadaver.
53
54 Workaround
55 ==========
56
57 A workaround is not currently known for this issue. All users are
58 advised to upgrade to the latest version of the affected package.
59
60 Resolution
61 ==========
62
63 cadaver users should upgrade to version 0.22.1 or later:
64
65 # emerge sync
66
67 # emerge -pv ">=net-misc/cadaver-0.22.1"
68 # emerge ">=net-misc/cadaver-0.22.1"
69
70 References
71 ==========
72
73 [ 1 ] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179
74
75 Availability
76 ============
77
78 This GLSA and any updates to it are available for viewing at
79 the Gentoo Security Website:
80
81 http://security.gentoo.org/glsa/glsa-200404-14.xml
82
83 Concerns?
84 =========
85
86 Security is a primary focus of Gentoo Linux and ensuring the
87 confidentiality and security of our users machines is of utmost
88 importance to us. Any security concerns should be addressed to
89 security@g.o or alternatively, you may file a bug at
90 http://bugs.gentoo.org.
91
92 License
93 =======
94
95 Copyright 2004 Gentoo Technologies, Inc; referenced text
96 belongs to its owner(s).
97
98 The contents of this document are licensed under the
99 Creative Commons - Attribution / Share Alike license.
100
101 http://creativecommons.org/licenses/by-sa/1.0