Gentoo Logo

ncpfs: Multiple vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200501-44 / ncpfs
Release Date January 30, 2005
Latest Revision January 30, 2005: 01
Impact normal
Exploitable remote and local
Package Vulnerable versions Unaffected versions Architecture(s)
net-fs/ncpfs < 2.2.6 >= 2.2.6 All supported architectures

Related bugreports: #77414

Synopsis

The ncpfs utilities contain multiple flaws, potentially resulting in the remote execution of arbitrary code or local file access with elevated privileges.

2.  Impact Information

Background

ncpfs is a NCP protocol network filesystem driver that allows access to NetWare services, to mount volumes of NetWare servers or print to NetWare print queues.

Description

Erik Sjolund discovered two vulnerabilities in the programs bundled with ncpfs: there is a potentially exploitable buffer overflow in ncplogin (CAN-2005-0014), and due to a flaw in nwclient.c, utilities using the NetWare client functions insecurely access files with elevated privileges (CAN-2005-0013).

Impact

The buffer overflow might allow a malicious remote NetWare server to execute arbitrary code on the NetWare client. Furthermore, a local attacker may be able to create links and access files with elevated privileges using SUID ncpfs utilities.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All ncpfs users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-fs/ncpfs-2.2.6"

4.  References



Print

Page updated January 30, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.