Hashcash: Possible heap overflow
Gentoo Linux Security Advisory
||GLSA 200606-25 / hashcash
||June 26, 2006
||July 29, 2006: 02
All supported architectures
A heap overflow vulnerability in the Hashcash utility could allow an
attacker to execute arbitrary code.
Hashcash is a utility for generating Hashcash tokens, a proof-of-work
system to reduce the impact of spam.
Andreas Seltenreich has reported a possible heap overflow in the
array_push() function in hashcash.c, as a result of an incorrect amount
of allocated memory for the "ARRAY" structure.
By sending malicious entries to the Hashcash utility, an attacker may
be able to cause an overflow, potentially resulting in the execution of
arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
All Hashcash users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/hashcash-1.21"