Lucene search

K
gentooGentoo FoundationGLSA-200501-01
HistoryJan 04, 2005 - 12:00 a.m.

LinPopUp: Buffer overflow in message reply

2005-01-0400:00:00
Gentoo Foundation
security.gentoo.org
7

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.05 Low

EPSS

Percentile

92.9%

Background

LinPopUp is a graphical application that acts as a frontend to Samba client messaging functions, allowing a Linux desktop to communicate with a Microsoft Windows computer that runs Winpopup.

Description

Stephen Dranger discovered that LinPopUp contains a buffer overflow in string.c, triggered when replying to a remote user message.

Impact

A remote attacker could craft a malicious message that, when replied using LinPopUp, would exploit the buffer overflow. This would result in the execution of arbitrary code with the privileges of the user running LinPopUp.

Workaround

There is no known workaround at this time.

Resolution

All LinPopUp users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-im/linpopup-2.0.4-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-im/linpopup< 2.0.4-r1UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.05 Low

EPSS

Percentile

92.9%