Home page logo

oss-sec logo oss-sec mailing list archives

CVE request: spamdyke buffer overflow vulnerability
From: Agostino Sarubbo <ago () gentoo org>
Date: Fri, 20 Jan 2012 09:42:20 +0100

According to secunia advisory:
https://secunia.com/advisories/47548/ :

Some vulnerabilities have been reported in spamdyke, which potentially can be 
exploited by malicious people to compromise a vulnerable system.

The vulnerabilities are caused due to boundary errors related to the incorrect 
use of the "snprintf()" and "vsnprintf()" functions, which can be exploited to 
cause buffer overflows.

The vulnerabilities are reported in versions prior to 4.3.0.

Update to version 4.3.0.

and from upstream changelog:
http://www.spamdyke.org/documentation/Changelog.txt :

Fixed a number of very serious errors in the usage of snprintf()/vsnprintf().
    The return value was being used as the length of the string printed into
    the buffer, but the return value really indicates the length of the string
    that *could* be printed if the buffer were of infinite size. Because the
    returned value could be larger than the buffer's size, this meant remotely
    exploitable buffer overflows were possible, depending on spamdyke's

and from upstream mailing list:
http://www.mail-archive.com/spamdyke-release () spamdyke org/msg00014.html

it also fixes a series of major bugs 
that could lead to buffer overflows.  Depending on spamdyke's configuration, 
these could cause remotely exploitable security holes.  Please upgrade 

Please assign a CVE

Agostino Sarubbo                ago -at- gentoo.org
Gentoo/AMD64 Arch Security Liaison

Attachment: signature.asc
Description: This is a digitally signed message part.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]