GLSA Bodhisattva
![Bodhisattva Bodhisattva](/images/ranks/rank-bodhisattva.gif)
![](images/avatars/9555681074926d9b92f09a.jpg)
Joined: 07 Aug 2002 Posts: 7731 Location: Underworld
|
Posted: Sun Nov 28, 2004 8:16 pm Post subject: [ GLSA 200411-37 ] Open DC Hub: Remote code execution |
|
|
Gentoo Linux Security Advisory
Title: Open DC Hub: Remote code execution (GLSA 200411-37)
Severity: high
Exploitable: remote
Date: November 28, 2004
Updated: May 22, 2006
Bug(s): #72371
ID: 200411-37
Synopsis
Open DC Hub contains a buffer overflow that can be exploited to allow
remote code execution.
Background
Open DC Hub is the hub software for the Direct Connect file sharing
network.
Affected Packages
Package: net-p2p/opendchub
Vulnerable: < 0.7.14-r2
Unaffected: >= 0.7.14-r2
Architectures: All supported architectures
Description
Donato Ferrante discovered a buffer overflow vulnerability in the
RedirectAll command of the Open DC Hub.
Impact
Upon exploitation, a remote user with administrative privileges can
execute arbitrary code on the system running the Open DC Hub.
Workaround
Only give administrative rights to trusted users.
Resolution
All Open DC Hub users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-p2p/opendchub-0.7.14-r2" |
References
Full-Disclosure Advisory
CVE-2004-1127
Last edited by GLSA on Sat Oct 11, 2014 4:18 am; edited 4 times in total |
|