| Summary: | net-p2p/napshare-1.3: auto_filter_extern overflows filename buffer | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Sascha Silbe <sascha-gentoo-bugzilla> | ||||||
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||||
| Status: | RESOLVED FIXED | ||||||||
| Severity: | enhancement | CC: | heiko.baums, net-p2p | ||||||
| Priority: | High | ||||||||
| Version: | unspecified | ||||||||
| Hardware: | All | ||||||||
| OS: | All | ||||||||
| Whiteboard: | C2 [masked removed] | ||||||||
| Package list: | Runtime testing required: | --- | |||||||
| Attachments: |
|
||||||||
|
Description
Sascha Silbe
2004-12-16 15:42:19 UTC
Created attachment 46177 [details]
File 40-1.c from advisory
Created attachment 46178 [details]
File 40-2.c from advisory
====================================================== Candidate: CAN-2004-1286 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1286 Reference: MISC:http://tigger.uic.edu/~jlongs2/holes/napshare.txt Buffer overflow in the auto_filter_extern function in auto.c for NapShare 1.2, with the extern filter enabled, allows remote attackers to execute arbitrary code via a crafted gnutella response. ====================================================== Upstream looks quite dead too. net-p2p: opinion ? Would you like to fix it, or do you prefer that we mask it ? I suppose noone in net-p2p cares about this one... Upstream is dead, requesting a mask for napshare. Masked per request of Koon. NapShare V2.1 is out, as of 2005-02-05. net-p2p please bump if the new release fixes this issue. I'm so confused. The code in napshare's CVS is still vulnerable... and NapShare v2.1 is written in C++ (as opposed to C), and has a completely different source tree. Someone please fill me in. I would say napshare-2 is a rewrite in C++, that is not in the SF CVS repository, for which we still have to verify if it's affected or not by the flaw. If it's not vulnerable, net-p2p should bump to it If it is, maybe we should inform upsatream of the bug beacuse they must have missed it. Auditors/someone: care to have a look ? 2+ is a complete rewrite and does not use the old code. This specific vulnerability does not exist in 2+. net-p2p: you can bump to napshare-2, remove affected versions and unmask. sekretarz will bump it I can't even build napshare-2.1 on my computer. If someone manages to build and can provide an ebuild... otherwise we'll keep it masked for some time before getting rid of it. NapShare 2.2.3 is based on MUTE 0.4 with some improvements. Until version 1.9 it was a Gnutella client. For installation instructions see my HOWTO for MUTE: http://forums.gentoo.org/viewtopic-t-331919.html Unfortunately I don't know how to make ebuilds but bug #37609 and bug #60392 could also help with NapShare. Removing the old vulnerable napshare package, since it has nothing to do with the current one anyway. |