Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 576880 - net-misc/minissdpd: improper validation of array index weakness
Summary: net-misc/minissdpd: improper validation of array index weakness
Status: RESOLVED OBSOLETE
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: ~3 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2016-03-09 15:35 UTC by Agostino Sarubbo
Modified: 2016-06-19 12:02 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2016-03-09 15:35:04 UTC
From ${URL} :

A vulnerability in the minissdpd daemon has been found that affects
minissdpd version 1.2.20130907-3 available in Debian and Ubuntu.
The vulnerability can be exploited by a local unprivileged user
with write access to /var/run/minissdpd.sock to crash the minissdpd
daemon that runs with superuser privileges.

More details at:
https://speirofr.appspot.com/files/advisory/SPADV-2016-02.md
https://bugs.debian.org/cgi-bin/pkgreport.cgi?pkg=minissdpd;dist=unstable.




@maintainer(s): since the package or the affected version has never been marked as stable, we don't need to stabilize it. After the bump, please remove the affected versions from the tree.
Comment 1 Anthony Basile gentoo-dev 2016-03-09 18:38:47 UTC
The effected versions have long been off the tree.  Currently we only have 1.5.20160119 and 1.5.20160301 on the tree.
Comment 2 Agostino Sarubbo gentoo-dev 2016-03-10 10:48:35 UTC
(In reply to Anthony Basile from comment #1)
> The effected versions have long been off the tree.  Currently we only have
> 1.5.20160119 and 1.5.20160301 on the tree.

Is not clear to me if who made the advisory tested only on debian-ubuntu and/or he believes that only 1.2 version is affected.

The patch has the following date:
Date: Fri, 4 Mar 2016 12:38:18 +0100
Subject: [PATCH] Fix minissdpd.c handling of request with negative length

Since the patch is recent, I really don't guess that we have a version that includes such patch. Maybe 1.5 is just not-affected.
Comment 3 Aaron Bauman (RETIRED) gentoo-dev 2016-06-19 12:02:54 UTC
Patch exists upstream, but cannot be validated against the current sources.  None of the effected code is found in the current upstream github or available Portage versions.

Testing of the vulnerability was only confirmed on version 1.2.20130907-3, which has long been gone from the tree.  Additionally, the package has never been marked stable.