SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   E2fsprogs Vendors:   e2fsprogs.sourceforge.net
E2fsprogs Buffer Overflow in libext2fs Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1019537
SecurityTracker URL:  http://securitytracker.com/id/1019537
CVE Reference:   CVE-2007-5497   (Links to External Site)
Date:  Mar 4 2008
Impact:   Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.40.3
Description:   A vulnerability was reported in E2fsprogs. A local user can obtain elevated privileges on the target system.

A local user can modify a filesystem so that when a target user or application executes libext2fs, a heap overflow will occur and arbitrary arbitrary code will be executed. The code will run with the privileges of the target user or application.

McAfee AVERT Research group reported this vulnerability in December 2007.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   The vendor has issued a fixed version (1.40.3).

The vendor's advisory is available at:

http://sourceforge.net/project/shownotes.php?release_id=560230&group_id=2406

Vendor URL:  e2fsprogs.sourceforge.net/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Mar 4 2008 (VMware Issues Fix for VMware ESX Server) E2fsprogs Buffer Overflow in libext2fs Lets Local Users Gain Elevated Privileges
VMware has issued a fix for VMware ESX Server 2.5.4 and 2.5.5.
Nov 19 2008 (Citrix Issues Fix for XenServer) E2fsprogs Buffer Overflow in libext2fs Lets Local Users Gain Elevated Privileges
Citrix has issued a fix for XenServer 4.0.1 and 4.1.0.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC