oss-sec mailing list archives

Re: pam_cifscreds stack overflow


From: cve-assign () mitre org
Date: Fri, 11 Apr 2014 02:13:42 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

We are tracking a patch at:

https://bugzilla.novell.com/show_bug.cgi?id=870168

Fixing buffer overflow in cifskey, maybe also used in samba itself?

Use CVE-2014-2830 for any product that is exploitable because of
the use of sprintf as shown in:

  http://bugzillafiles.novell.org/attachment.cgi?id=585460

Apparently one exploitable case is the pam_cifscreds product. We do not
know whether there is an exploitable case in the cifs-utils package
because of the:

  https://git.samba.org/?p=cifs-utils.git;a=blob;f=cifskey.c

code. There might be other products using an essentially identical
cifskey.c file.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTR4e+AAoJEKllVAevmvmsXnkIAK1AI1cXGWICxk/efLoDVCTH
hkyy/hFYpPa5/qsGoH9sbnHTCtFcHA/rwm2NLLuDCVNzw9C50e/w9mDWI21M4uN3
ogRjeghZjz1ut1TpH6JFD9dnpcUI/JSdFl7vgWlWwmyNcYQowWlUMX/dR5lLnj14
GMUZrHJXuutLUxnsGxX6MOStWRcC3QkOJZREJAdTsru9blhKYZHDsCtdaGQJpnIh
ivAEOeYpKY5f+9lfEBbfelNh/G6p6gKjZtPMO0HXdfLXB5iUxLpx8gKNiRrRmzZw
EM+s/XfzTnS+3OOy7iQyE1kLN44jPh0S85UuDZ9xxdkEQdEeUszr7TrLgF9s0cA=
=5G8d
-----END PGP SIGNATURE-----


Current thread: