Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 314699 (CVE-2010-1100) - www-client/arora: Integer overflow (CVE-2010-1100)
Summary: www-client/arora: Integer overflow (CVE-2010-1100)
Status: RESOLVED INVALID
Alias: CVE-2010-1100
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://code.google.com/p/arora/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2010-04-11 15:02 UTC by Tomás Touceda (RETIRED)
Modified: 2012-02-02 15:34 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tomás Touceda (RETIRED) gentoo-dev 2010-04-11 15:02:15 UTC
CVE-2010-1100 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1100):
  Integer overflow in Arora allows remote attackers to bypass intended
  port restrictions on outbound TCP connections via a port number
  outside the range of the unsigned short data type, as demonstrated by
  a value of 65561 for TCP port 25.
Comment 1 Ben de Groot (RETIRED) gentoo-dev 2010-04-12 11:23:35 UTC
http://security-tracker.debian.org/tracker/CVE-2010-1100 notes:
Advisory is wrong, URL range is protected by QUrl
Comment 2 Davide Pesavento gentoo-dev 2011-11-20 14:21:57 UTC
(In reply to comment #1)
> http://security-tracker.debian.org/tracker/CVE-2010-1100 notes:
> Advisory is wrong, URL range is protected by QUrl

So, is this invalid?
Comment 3 Tim Sammut (RETIRED) gentoo-dev 2011-12-08 23:54:41 UTC
@qt, thoughts on this? Thanks!
Comment 4 Markos Chandras (RETIRED) gentoo-dev 2012-02-02 08:30:49 UTC
I believe the advisory is wrong yes
Comment 5 Tim Sammut (RETIRED) gentoo-dev 2012-02-02 15:34:15 UTC
Ok, thanks. Marking this as invalid.