SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   NASM Vendors:   nasm.sourceforge.net
(Mandrake Issues Fix) NASM Buffer Overflow in error() Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1012807
SecurityTracker URL:  http://securitytracker.com/id/1012807
CVE Reference:   CVE-2004-1287   (Links to External Site)
Date:  Jan 7 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 0.98.38
Description:   A vulnerability was reported in NASM. A remote user can cause arbitrary code to be executed by the target user.

D. J. Bernstein reported that a remote user can create a specially crafted asm file that, when processed by the target user with NASM, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

The buffer overflow resides in the error() function in 'preproc.c'.

Jonathan Rockway is credited with discovering this flaw.

Impact:   A remote user can cause arbitrary code to be executed by the target user with the privileges of the target user.
Solution:   Mandrake has released a fix.

Mandrakelinux 10.0:
bfeacd381e7fbf8b99e96a2430311ed4 10.0/RPMS/nasm-0.98.38-1.1.100mdk.i586.rpm
114bfd2649248582ad463a187a826e33 10.0/RPMS/nasm-doc-0.98.38-1.1.100mdk.i586.rpm
ed611f8bbd6cfa91b9d7944c9b815902 10.0/RPMS/nasm-rdoff-0.98.38-1.1.100mdk.i586.rpm
f431fa5e5f6a59718efcfb41edab3be3 10.0/SRPMS/nasm-0.98.38-1.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
dc9af90c5b786c155544f48046e9dfe4 amd64/10.0/RPMS/nasm-0.98.38-1.1.100mdk.amd64.rpm
f0c59ffd65fd1285e577af0b8ce9baa1 amd64/10.0/RPMS/nasm-doc-0.98.38-1.1.100mdk.amd64.rpm
d044b7e60404106957e51e3c2841feed amd64/10.0/RPMS/nasm-rdoff-0.98.38-1.1.100mdk.amd64.rpm
f431fa5e5f6a59718efcfb41edab3be3 amd64/10.0/SRPMS/nasm-0.98.38-1.1.100mdk.src.rpm

Mandrakelinux 10.1:
47bc2f9600153b30d7e63321360b8d76 10.1/RPMS/nasm-0.98.38-1.1.101mdk.i586.rpm
1995e7f847f816be99b917867cf9a139 10.1/RPMS/nasm-doc-0.98.38-1.1.101mdk.i586.rpm
1a2242ced53b91dfe2179a26527dca33 10.1/RPMS/nasm-rdoff-0.98.38-1.1.101mdk.i586.rpm
92183c2e2e68b8a12e3a0d6aa692763f 10.1/SRPMS/nasm-0.98.38-1.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
ed510372fa24800e7b0faf78e84d8a0b x86_64/10.1/RPMS/nasm-0.98.38-1.1.101mdk.x86_64.rpm
c3fdef84d0c9b383ae78aa929d110f78 x86_64/10.1/RPMS/nasm-doc-0.98.38-1.1.101mdk.x86_64.rpm
3a83b689ba75be2ed28b3edea7270ea9 x86_64/10.1/RPMS/nasm-rdoff-0.98.38-1.1.101mdk.x86_64.rpm
92183c2e2e68b8a12e3a0d6aa692763f x86_64/10.1/SRPMS/nasm-0.98.38-1.1.101mdk.src.rpm

Vendor URL:  nasm.sourceforge.net/wakka.php?wakka=HomePage (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Mandriva/Mandrake)
Underlying OS Comments:  10.0, 10.1

Message History:   This archive entry is a follow-up to the message listed below.
Dec 16 2004 NASM Buffer Overflow in error() Lets Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  [Security Announce] MDKSA-2005:004 - Updated nasm packages fix


This is a multi-part message in MIME format...

------------=_1105047132-1122-8899

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           nasm
 Advisory ID:            MDKSA-2005:004
 Date:                   January 6th, 2005

 Affected versions:	 10.0, 10.1
 ______________________________________________________________________

 Problem Description:

 A buffer overflow in nasm was discovered by Jonathan Rockway.  This
 vulnerability could lead to the execution of arbitrary code when
 compiling a malicious assembler source file.
 
 The updated packages are patched to correct the problem.
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 bfeacd381e7fbf8b99e96a2430311ed4  10.0/RPMS/nasm-0.98.38-1.1.100mdk.i586.rpm
 114bfd2649248582ad463a187a826e33  10.0/RPMS/nasm-doc-0.98.38-1.1.100mdk.i586.rpm
 ed611f8bbd6cfa91b9d7944c9b815902  10.0/RPMS/nasm-rdoff-0.98.38-1.1.100mdk.i586.rpm
 f431fa5e5f6a59718efcfb41edab3be3  10.0/SRPMS/nasm-0.98.38-1.1.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 dc9af90c5b786c155544f48046e9dfe4  amd64/10.0/RPMS/nasm-0.98.38-1.1.100mdk.amd64.rpm
 f0c59ffd65fd1285e577af0b8ce9baa1  amd64/10.0/RPMS/nasm-doc-0.98.38-1.1.100mdk.amd64.rpm
 d044b7e60404106957e51e3c2841feed  amd64/10.0/RPMS/nasm-rdoff-0.98.38-1.1.100mdk.amd64.rpm
 f431fa5e5f6a59718efcfb41edab3be3  amd64/10.0/SRPMS/nasm-0.98.38-1.1.100mdk.src.rpm

 Mandrakelinux 10.1:
 47bc2f9600153b30d7e63321360b8d76  10.1/RPMS/nasm-0.98.38-1.1.101mdk.i586.rpm
 1995e7f847f816be99b917867cf9a139  10.1/RPMS/nasm-doc-0.98.38-1.1.101mdk.i586.rpm
 1a2242ced53b91dfe2179a26527dca33  10.1/RPMS/nasm-rdoff-0.98.38-1.1.101mdk.i586.rpm
 92183c2e2e68b8a12e3a0d6aa692763f  10.1/SRPMS/nasm-0.98.38-1.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 ed510372fa24800e7b0faf78e84d8a0b  x86_64/10.1/RPMS/nasm-0.98.38-1.1.101mdk.x86_64.rpm
 c3fdef84d0c9b383ae78aa929d110f78  x86_64/10.1/RPMS/nasm-doc-0.98.38-1.1.101mdk.x86_64.rpm
 3a83b689ba75be2ed28b3edea7270ea9  x86_64/10.1/RPMS/nasm-rdoff-0.98.38-1.1.101mdk.x86_64.rpm
 92183c2e2e68b8a12e3a0d6aa692763f  x86_64/10.1/SRPMS/nasm-0.98.38-1.1.101mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFB3aaVmqjQ0CJFipgRAoEdAJ9PpM5rdVbA0mM2vXFTNfEawpfeywCfdGB1
OcI8lB5IV6fOmLMbbSkIeDA=
=tch/
-----END PGP SIGNATURE-----


------------=_1105047132-1122-8899
Content-Type: text/plain; name="message.footer"
Content-Disposition: inline; filename="message.footer"
Content-Transfer-Encoding: 8bit

____________________________________________________
Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com
Join the Club : http://www.mandrakeclub.com
____________________________________________________

------------=_1105047132-1122-8899--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC