Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 252830 - net-im/psi <0.12.1 Remote DoS (CVE-2008-6393)
Summary: net-im/psi <0.12.1 Remote DoS (CVE-2008-6393)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://secunia.com/Advisories/33311/
Whiteboard: B3 [noglsa]
Keywords:
Depends on: 248038
Blocks:
  Show dependency tree
 
Reported: 2008-12-28 17:25 UTC by Alex Legler (RETIRED)
Modified: 2009-03-04 17:08 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alex Legler (RETIRED) archtester gentoo-dev Security 2008-12-28 17:25:35 UTC
From Secunia:

Description:
sha0 has discovered some vulnerabilities in Psi, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerabilities are caused due to boundary errors in the file transfer functionality when receiving packets. These can be exploited to cause heap-based buffer overflows by sending a specially crafted packet to the file transfer service (by default port 8010/TCP).

The vulnerabilities are confirmed in version 0.12 for Windows. Other versions may also be affected.

Solution:
Restrict access to the file transfer service.
Comment 1 Alex Legler (RETIRED) archtester gentoo-dev Security 2008-12-28 17:27:24 UTC
The exploit on http://milw0rm.com/exploits/7555 crashed 0.1.2 here on ~amd64.
Comment 2 Peter Volkov (RETIRED) gentoo-dev 2009-02-18 14:35:28 UTC
New ebuild, psi-0.12.1 was added to the tree, which includes fix for this problem. Arch teams, please, stabilize.

Security, please, note that there exist exploit for this issue.
Comment 3 Ferris McCormick (RETIRED) gentoo-dev 2009-02-18 16:51:19 UTC
Sparc stable.  It seems to work and because it's a security bug.
Comment 4 Tobias Heinlein (RETIRED) gentoo-dev 2009-02-18 18:04:32 UTC
amd64 stable.
Comment 5 Jeroen Roovers (RETIRED) gentoo-dev 2009-02-18 20:07:01 UTC
Stable for HPPA.
Comment 6 Brent Baude (RETIRED) gentoo-dev 2009-02-18 20:44:30 UTC
ppc64 done
Comment 7 Raúl Porcel (RETIRED) gentoo-dev 2009-02-22 12:03:11 UTC
x86 stable
Comment 8 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-02-25 20:29:15 UTC
ppc look done:
  25 Feb 2009; Tobias Scherbaum <dertobi123@gentoo.org> psi-0.12.1.ebuild:
  ppc stable, bug #252830

I requested a CVE for this on oss-sec.

Please vote for a GLSA.
Comment 9 Ferris McCormick (RETIRED) gentoo-dev 2009-02-25 21:31:18 UTC
Sure.
Comment 10 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2009-02-27 23:01:22 UTC
it's more-or-less a client DoS but i would hardly agree with that bug because it concerns a server-like service (embedded file transfer service). Still, the impact remains very low.

So i vote noglsa.
Comment 11 Robert Buchholz (RETIRED) gentoo-dev 2009-02-28 03:13:54 UTC
NO as well, closing.
Comment 12 Robert Buchholz (RETIRED) gentoo-dev 2009-03-04 17:08:04 UTC
CVE-2008-6393 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6393):
  PSI Jabber client before 0.12.1 allows remote attackers to cause a
  denial of service (crash) and possibly execute arbitrary code via a
  file transfer request with a negative value in a SOCKS5 option, which
  bypasses a signed integer check and triggers an integer overflow and
  a heap-based buffer overflow.