Lucene search

K
gentooGentoo FoundationGLSA-200406-22
HistoryJun 30, 2004 - 12:00 a.m.

Pavuk: Remote buffer overflow

2004-06-3000:00:00
Gentoo Foundation
security.gentoo.org
8

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

73.9%

Background

Pavuk is web spider and website mirroring tool.

Description

When Pavuk connects to a web server and the server sends back the HTTP status code 305 (Use Proxy), Pavuk copies data from the HTTP Location header in an unsafe manner.

Impact

An attacker could cause a stack-based buffer overflow which could lead to arbitrary code execution with the rights of the user running Pavuk.

Workaround

There is no known workaround at this time. All users are encouraged to upgrade to the latest available version.

Resolution

All Pavuk users should upgrade to the latest stable version:

 # emerge sync
 
 # emerge -pv ">=net-misc/pavuk-0.9.28-r2"
 # emerge ">="net-misc/pavuk-0.9.28-r2
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-misc/pavuk<= 0.9.28-r1UNKNOWN

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

73.9%