Gentoo Logo

Buffer overflow in Midnight Commander

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200403-09 / mc
Release Date March 29, 2004
Latest Revision March 29, 2004: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-misc/mc <= 4.6.0-r4 >= 4.6.0-r5 All supported architectures

Related bugreports: #45957

Synopsis

A remotely-exploitable buffer overflow in Midnight Commander allows arbitrary code to be run on a user's computer

2.  Impact Information

Background

Midnight Commander is a visual file manager.

Description

A stack-based buffer overflow has been found in Midnight Commander's virtual filesystem.

Impact

This overflow allows an attacker to run arbitrary code on the user's computer during the symlink conversion process.

3.  Resolution Information

Workaround

While a workaround is not currently known for this issue, all users are advised to upgrade to the latest version of the affected package.

Resolution

All users should upgrade to the current version of the affected package:

Code Listing 3.1: Resolution

# emerge sync

# emerge -pv ">=app-misc/mc-4.6.0-r5"
# emerge ">=app-misc/mc-4.6.0-r5"

4.  References



Print

Page updated March 29, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.