cadaver heap-based buffer overflow
Gentoo Linux Security Advisory
||GLSA 200405-15 / cadaver
||May 20, 2004
||May 20, 2004: 01
All supported architectures
There is a heap-based buffer overflow vulnerability in the neon library
used in cadaver, possibly leading to execution of arbitrary code when
connected to a malicious server.
cadaver is a command-line WebDAV client.
Stefan Esser discovered a vulnerability in the code of the neon library
(see GLSA 200405-13). This library is also included in cadaver.
When connected to a malicious WebDAV server, this vulnerability could allow
remote execution of arbitrary code with the rights of the user running
There is no known workaround at this time. All users are advised to upgrade
to the latest available version of cadaver.
All users of cadaver should upgrade to the latest stable version:
Code Listing 3.1: Resolution
# emerge sync
# emerge -pv ">=net-misc/cadaver-0.22.2"
# emerge ">=net-misc/cadaver-0.22.2"