Red Hat Bugzilla – Bug 107821
CAN-2003-0853/0854 DoS in services that use "ls"
Last modified: 2007-11-30 17:06:53 EST
Georgi Guninski discovered a memory starvation denial of service vulnerability in the ls program. It is possible to make ls allocate a huge amount of memory by specifing certain command line arguments. This vulnerability is remotely exploitable through services like wu-ftpd which pass user arguments to ls. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0854 to this issue. A non-exploitable integer overflow in ls has been discovered. It is possible to make ls crash by specifing certain command line arguments. This vulnerability is remotely exploitable through services like wu-ftpd which pass user arguments to ls. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0853 to this issue. RHSA-2003:310 in progress to correct these issues. Public Oct22
An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2003-310.html