Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » FreeBSD SN-03:02: setiathome buffer overflow

FreeBSD SN-03:02: setiathome buffer overflow

by Nikola Strahija on April 9th, 2003 A buffer overflow vulnerability has been found in FreeBSD Setiathome client port which is triggered by sending and overly large string followed by a newline character.


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

==============================================================
FreeBSD-SN-03:02 Security Notice
The FreeBSD Project

Topic: security issue in [email protected] client
Announced: 2003-04-08

I. Introduction

A port in the FreeBSD Ports Collection is affected by a security
issue. Summary information is given below with references and
affected versions. All versions given refer to the FreeBSD
port/package version numbers. The listed vulnerabilities are not
specific to FreeBSD unless otherwise noted.

This port is not installed by default, nor is it ``part of FreeBSD''
as such. The FreeBSD Ports Collection contains thousands of
third-party applications in a ready-to-install format. FreeBSD makes
no claim about the security of these third-party applications. See
http://www.freebsd.org/ports/ for more information about the
FreeBSD Ports Collection.

II. Ports

+------------------------------------------------------------------------+
Port name: astro/setiathome
Affected: All versions
Status: Not fixed

Excerpt from Berend-Jan Wever a.k.a. SkyLined's advisory:
``There is a bufferoverflow in the server responds handler. Sending
an overly large string followed by a newline ('n') character to the
client will trigger this overflow. This has been tested with various
versions of the client. All versions are presumed to have this flaw in
some form.''
Example exploits for FreeBSD and other systems exist.
A new version of [email protected] for FreeBSD is not available at the time
of this security notice.

http://spoor12.edup.tudelft.nl/
http://setiathome.berkeley.edu/version308.html
+------------------------------------------------------------------------+

FreeBSD Security Notices are communications from the Security Officer
intended to inform the user community about potential security issues,
such as bugs in the third-party applications found in the Ports
Collection, which will not be addressed in a FreeBSD Security
Advisory.

Feedback on Security Notices is welcome at .
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)

iD8DBQE+kruuFdaIBMps37IRAksIAKCXua4QQz3P3Y4qysYW8/ftjQhozQCfVnNw
PZAo0yzuFpYydTgYrodW+4Q=
=DQki
-----END PGP SIGNATURE-----


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »