SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Pound Vendors:   Apsis GmbH
Pound Format String Flaw in Syslog Processing Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1010034
SecurityTracker URL:  http://securitytracker.com/id/1010034
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  May 3 2004
Impact:   Execution of arbitrary code via network, Root access via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.5 and prior versions
Description:   A vulnerability was reported in the Pound reverse proxy and load balancing software. A remote user can execute arbitrary code on the target system.

The vendor reported that there is a format string flaw in the processing of syslog messages. A remote user can trigger the flaw to execute arbitrary code on the target system. The code will run with the privileges of the pound process, which may be root privileges on some configurations.

The vendor credits Akira Higuchi with reporting this flaw.

Impact:   A remote user can execute arbitrary code on the target system with the privileges of the pound daemon.
Solution:   The vendor has released a fixed version (1.6), available at:

http://www.apsis.ch/pound/

Vendor URL:  www.apsis.ch/pound/ (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
May 18 2004 (Gentoo Issues Fix) Pound Format String Flaw in Syslog Processing Lets Remote Users Execute Arbitrary Code
Gentoo has issued a fix.



 Source Message Contents

Subject:  http://www.apsis.ch/pound/pound_list/archive/2003/2003-12/1070234315000#1070234315000


http://www.apsis.ch/pound/pound_list/archive/2003/2003-12/1070234315000#1070234315000

 > ANNOUNCE: Pound - reverse proxy and load balancer - v1.6
 > Robert Segall <roseg(at)apsis.ch> 	2003-12-01 00:18:35
 >
 > This is to announce the release of Pound v1.6.
 >
 > Changes in this version:

 > - Fixed security vulnerability in syslog handling
 >
 > The reason foe this rather hasty announcement: a security vulnerability was
 > brought to my attention (many thanks to Akira Higuchi). Everyone running any
 > previous version should upgrade to 1.6 immediately - the vulnerability may
 > allow a remote exploit. No exploits are currently known and none have been
 > observed in the wild till now. The danger is minimised if you run Pound in a
 > root jail and/or you run Pound as non-root user.


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC