SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   samhain Vendors:   Wichmann, Rainer
samhain sh_hash_compdata() Buffer Overflow May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1012142
SecurityTracker URL:  http://securitytracker.com/id/1012142
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Nov 9 2004
Impact:   Execution of arbitrary code via local system, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 2.0.2
Description:   Some vulnerabilities were reported in samhain. A local user may be able to execute arbitrary code.

The vendor reported that there is a buffer overflow in the sh_hash_compdata() function that can be triggered when in 'update' mode. A local user can set a specially crafted pathname that, when processed by samhain, may trigger the overflow and potentially execute arbitrary code.

It is also reported that there is a potential null pointer dereference in the sh_hash_compdata() function.

Impact:   A local user may be able to cause samhain to execute arbitrary code with the privileges of the user running samhain.
Solution:   The vendor has released a fixed version (2.0.2), available at:

http://la-samhna.de/samhain/s_download.html

Vendor URL:  la-samhna.de/samhain/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC