SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   cadaver Vendors:   webdav.org
(Red Hat Issues Fix for Cadaver for RH Linux) neon Library Heap Overflow in ne_rfc1036_parse() Date Parsing Function May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1011459
SecurityTracker URL:  http://securitytracker.com/id/1011459
CVE Reference:   CVE-2004-0398   (Links to External Site)
Date:  Sep 29 2004
Impact:   Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 0.24.5 and prior versions
Description:   A vulnerability was reported in neon in the date parsing function. A remote user can execute arbitrary code on the target system. Cadaver is affected.

Stefan Esser of e-matters reported that there is a heap overflow in the neon library. A user can reportedly supply a specially crafted date string to the ne_rfc1036_parse() to trigger the overflow.

A remote or local user may be able to execute arbitrary code on the target system. The specific impact depends on the target application that uses the affected neon library function.

The report indicates that OpenOffice and Subversion do not use this function and are not affected.

The original advisory is available at:

http://security.e-matters.de/advisories/062004.html

Impact:   A remote user may be able to execute arbitrary code on the target system. The specific impact depends on the target application that uses the affected neon library function.
Solution:   Red Hat has released a fix.

Red Hat Linux 7.3:

SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/cadaver-0.22.1-1.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/cadaver-0.22.1-1.legacy.i386.rpm

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/cadaver-0.22.1-3.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/cadaver-0.22.1-3.legacy.i386.rpm

The SHA1 verification checksums are:

46931edc0f4e8ad25c994891938c103a45f28982 7.3/updates/SRPMS/cadaver-0.22.1-1.legacy.src.rpm
0c3742f3151d4dedc5e5320a3a4792f17e8bd2e4 7.3/updates/i386/cadaver-0.22.1-1.legacy.i386.rpm
6cc852676c85e9cc3dc8e472676185cdffabf09f 9/updates/SRPMS/cadaver-0.22.1-3.legacy.src.rpm
1a9d4e010885e902b2a6a994cfee5744b7f4afba 9/updates/i386/cadaver-0.22.1-3.legacy.i386.rpm

Vendor URL:  www.webdav.org/neon (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Red Hat Linux)
Underlying OS Comments:  7.3, 9

Message History:   This archive entry is a follow-up to the message listed below.
May 19 2004 neon Library Heap Overflow in ne_rfc1036_parse() Date Parsing Function May Let Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  [Full-Disclosure] [FLSA-2004:1552] Updated cadaver packages that fix security vulnerabilities



--bCsyhTFzCvuiizWE
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

-----------------------------------------------------------------------
               Fedora Legacy Update Advisory

Synopsis:          Updated cadaver resolves security vulnerabilities
Advisory ID:       FLSA:1552
Issue date:        2004-09-29
Product:           Red Hat Linux
Keywords:          Security
Cross references:  https://bugzilla.fedora.us/show_bug.cgi?id=3D1552
CVE Names:         CAN-2004-0179, CAN-2004-0398
-----------------------------------------------------------------------


-----------------------------------------------------------------------
1. Topic:

Updated cadaver packages that fix multiple security vulnerability are
now available.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386

3. Problem description:

An updated cadaver package that fixes a vulnerability in neon exploitable
by a malicious DAV server is now available.

cadaver is a command-line WebDAV client that uses inbuilt code from neon,
an HTTP and WebDAV client library.

Versions of the neon client library up to and including 0.24.4 have been
found to contain a number of format string bugs. An attacker could create
a malicious WebDAV server in such a way as to allow arbitrary code
execution on the client should a user connect to it using cadaver. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0179 to this issue. This issue was addressed in a previous
update for Red Hat Linux 9.

Stefan Esser discovered a flaw in the neon library which allows a heap
buffer overflow in a date parsing routine. An attacker could create
a malicious WebDAV server in such a way as to allow arbitrary code
execution on the client should a user connect to it using cadaver. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0398 to this issue.

Users of cadaver are advised to upgrade to this updated package, which
contains patches correcting these issues.

4. Solution:

Before applying this update, make sure all previously released errata=20
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those=20
RPMs which are currently installed will be updated.  Those RPMs which are=
=20
not installed but included in the list will not be updated.  Note that you=
=20
can also use wildcards (*.rpm) if your current directory *only* contains=20
the desired RPMs.

Please note that this update is also available via yum and apt.  Many=20
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the appropriate=
=20
RPMs being upgraded on your system.  This assumes that you have yum or=20
apt-get configured for obtaining Fedora Legacy content. Please visit=20
http://www.fedoralegacy.org/docs/ for directions on how to configure yum=20
and apt-get.

5. Bug IDs fixed:

http://bugzilla.fedora.us - 1552 - cadaver neon vulnerability (CAN-2004-017=
9)

6. RPMs required:

Red Hat Linux 7.3:

SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/cadaver-0.22.1-1.=
legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/cadaver-0.22.1-1.l=
egacy.i386.rpm

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/cadaver-0.22.1-3.le=
gacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/cadaver-0.22.1-3.leg=
acy.i386.rpm

7. Verification:

SHA1 sum                                 Package Name
---------------------------------------------------------------------------

46931edc0f4e8ad25c994891938c103a45f28982  7.3/updates/SRPMS/cadaver-0.22.1-=
1.legacy.src.rpm
0c3742f3151d4dedc5e5320a3a4792f17e8bd2e4  7.3/updates/i386/cadaver-0.22.1-1=
=2Elegacy.i386.rpm
6cc852676c85e9cc3dc8e472676185cdffabf09f  9/updates/SRPMS/cadaver-0.22.1-3.=
legacy.src.rpm
1a9d4e010885e902b2a6a994cfee5744b7f4afba  9/updates/i386/cadaver-0.22.1-3.l=
egacy.i386.rpm

These packages are GPG signed by Fedora Legacy for security.  Our key is=20
available from http://www.fedoralegacy org/about/security.php

You can verify each package with the following command:

    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or=20
tampered with, examine only the sha1sum with the following command:

    sha1sum <filename>

8. References:

http://security.e-matters.de/advisories/062004.html

9. Contact:

The Fedora Legacy security contact is <secnotice@fedoralegacy.org>. More=20
project details at http://www.fedoralegacy.org

---------------------------------------------------------------------

--bCsyhTFzCvuiizWE
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBWt9FYzuFKFF44qURAnrKAJ4k3PDN7bOtFTgaoIsFH/oiAydAUwCgma2o
cK/BFE1OmpL205222pHT4hA=
=hB76
-----END PGP SIGNATURE-----

--bCsyhTFzCvuiizWE--

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC