Bug 153983 - Buffer overflow in Midnight Commander (mc) 4.5.55 and earlier may allow attackers to execute arbitrary code.
Buffer overflow in Midnight Commander (mc) 4.5.55 and earlier may allow atta...
Status: CLOSED DUPLICATE of bug 158671
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: mc (Show other bugs)
2.1
All Linux
medium Severity medium
: ---
: ---
Assigned To: Jindrich Novy
Jay Turner
http://cve.mitre.org/cgi-bin/cvename....
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2005-04-06 08:52 EDT by Leonard den Ottolander
Modified: 2015-01-07 19:09 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-06-16 21:46:58 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Fix for CAN-2005-0763 (taken from Debian mc-4.5.55-1.2woody6). (657 bytes, patch)
2005-04-06 08:52 EDT, Leonard den Ottolander
no flags Details | Diff

  None (edit)
Description Leonard den Ottolander 2005-04-06 08:52:24 EDT
Buffer overflow in Midnight Commander (mc) 4.5.55 and earlier may allow
attackers to execute arbitrary code.

Only affects RHL 7.3

See http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0763 and
http://www.debian.org/security/2005/dsa-698

Attachment is extracted patch for CAN-2005-0763 from mc-4.5.55-1.2woody6
mentioned in Debian advisory.
Comment 1 Leonard den Ottolander 2005-04-06 08:52:24 EDT
Created attachment 112755 [details]
Fix for CAN-2005-0763 (taken from Debian mc-4.5.55-1.2woody6).
Comment 2 Jindrich Novy 2005-04-06 09:10:25 EDT
Hello Leonard,

thanks for the patch. I'm not quite sure it's worth fixing as the buffer
overflowed of one single byte :)
Comment 3 Jindrich Novy 2005-04-07 03:33:37 EDT
The fix is now applied, thanks.
Comment 4 Josh Bressers 2005-06-16 21:46:58 EDT

*** This bug has been marked as a duplicate of 158671 ***

Note You need to log in before you can comment on or make changes to this bug.