Gentoo Logo

ulogd: Remote execution of arbitrary code

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200703-17 / ulogd
Release Date March 18, 2007
Latest Revision March 18, 2007: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-admin/ulogd < 1.23-r1 >= 1.23-r1 All supported architectures

Related bugreports: #161882

Synopsis

ulogd contains a possible buffer overflow potentially allowing for the remote execution of arbitrary code.

2.  Impact Information

Background

ulogd is a userspace daemon for netfilter related logging.

Description

SUSE reported unspecified buffer overflows in ulogd involving the calculation of string lengths.

Impact

A remote attacker could trigger a possible buffer overflow through unspecified vectors, potentially leading to the remote execution of arbitrary code with the rights of the user running the ulogd daemon, or more probably leading to the crash of the daemon.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All ulogd users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/ulogd-1.23-r1"

4.  References



Print

Page updated March 18, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.