Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 498548 (CVE-2013-7299) - <dev-libs/tntnet-2.2.1: request headers are not cleared correctly (CVE-2013-7299)
Summary: <dev-libs/tntnet-2.2.1: request headers are not cleared correctly (CVE-2013-7...
Status: RESOLVED FIXED
Alias: CVE-2013-7299
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks: 423697
  Show dependency tree
 
Reported: 2014-01-19 11:49 UTC by Agostino Sarubbo
Modified: 2016-06-11 11:43 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-01-19 11:49:56 UTC
From ${URL} :

Affected software: Tntnet
Description: By sending a crafted HTTP request that uses "\n" to end
its headers instead of the expected "\r\n", it is possible that
headers from a previous unrelated request will seemingly be appended
to the crafted request (due to a missing null termination). This
allows a remote attacker to use sensitive headers from other users'
requests in their own requests, such as cookies or HTTP authentication
credentials.
Affected versions: current releases  (<= 2.2)
Fixed in version: 2.2.1
Fix: https://github.com/maekitalo/tntnet/commit/9bd3b14042e12d84f39ea9f55731705ba516f525
and https://github.com/maekitalo/tntnet/commit/9d1a859e28b78bfbf769689454b529ac7709dee4
Release notes: http://www.tntnet.org/download/tntnet-2.2.1/Releasenotes-2.2.1.markdown
Reported by: Matthew Daley



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Pacho Ramos gentoo-dev 2014-02-15 15:31:50 UTC
*tntnet-2.2.1 (23 Jan 2014)

  23 Jan 2014; Joerg Bornkessel <hd_brummy@gentoo.org> +tntnet-2.2.1.ebuild:
  bump; use-flag cgi removed, support removed in source; useflag sdk removed,
  --with-skd enabled by default, will not compile without sdk support
Comment 2 Joerg Bornkessel (RETIRED) gentoo-dev 2014-06-11 19:01:32 UTC
dev-libs/tntnet-2.2.1 stable amd64, x86
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2015-01-03 17:11:14 UTC
CVE-2013-7299 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7299):
  framework/common/messageheaderparser.cpp in Tntnet before 2.2.1 allows
  remote attackers to obtain sensitive information via a header that ends in
  \n instead of \r\n, which prevents a null terminator from being added and
  causes Tntnet to include headers from other requests.
Comment 4 Aaron Bauman (RETIRED) gentoo-dev 2016-03-01 13:59:49 UTC
@maintainers, please remove vulnerable version (1.6.3) from tree.
Comment 5 Aaron Bauman (RETIRED) gentoo-dev 2016-06-11 11:43:20 UTC
GLSA Vote: No.