blob: cb51d5cfc8cc502160fa4047c111a6a8dc1494f2 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
|
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200404-11">
<title>Multiple Vulnerabilities in pwlib</title>
<synopsis>
Multiple vulnerabilities have been found in pwlib that may lead to a remote
denial of service or buffer overflow attack.
</synopsis>
<product type="ebuild">dev-libs/pwlib</product>
<announced>2004-04-09</announced>
<revised count="01">2004-04-09</revised>
<bug>45846</bug>
<access>remote</access>
<affected>
<package name="dev-libs/pwlib" auto="yes" arch="*">
<unaffected range="ge">1.5.2-r3</unaffected>
<vulnerable range="le">1.5.2-r2</vulnerable>
</package>
</affected>
<background>
<p>
pwlib is a multi-platform library designed for OpenH323.
</p>
</background>
<description>
<p>
Multiple vulnerabilities have been found in the implimentation of protocol
H.323 contained in pwlib. Most of the vulnerabilies are in the parsing of
ASN.1 elements which would allow an attacker to use a maliciously crafted
ASN.1 element to cause unpredictable behavior in pwlib.
</p>
</description>
<impact type="high">
<p>
An attacker may cause a denial of service condition or cause a buffer
overflow that would allow arbitrary code to be executed with root
privileges.
</p>
</impact>
<workaround>
<p>
Blocking ports 1719 and 1720 may reduce the likelihood of an attack. All
users are advised to upgrade to the latest version of the affected package.
</p>
</workaround>
<resolution>
<p>
All pwlib users are advised to upgrade to version 1.5.2-r3 or later:
</p>
<code>
# emerge sync
# emerge -pv ">=dev-libs/pwlib-1.5.2-r3"
# emerge ">=dev-libs/pwlib-1.5.2-r3"</code>
</resolution>
<references>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0097">CAN-2004-0097</uri>
<uri link="http://www.uniras.gov.uk/vuls/2004/006489/h323.htm">NISCC Vulnerability Advisory 006489/H323</uri>
</references>
<metadata tag="submitter">
aescriva
</metadata>
</glsa>
|