Bug 251676 (CVE-2007-3961) - CVE-2007-3961 fsplib off-by-one error
Summary: CVE-2007-3961 fsplib off-by-one error
Status: CLOSED NOTABUG
Alias: CVE-2007-3961
Product: Security Response
Classification: Other
Component: vulnerability   
(Show other bugs)
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: source=internet,reported=20070809,pub...
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-08-10 11:38 UTC by Tomas Hoger
Modified: 2016-03-04 12:51 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-08-10 12:58:18 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

Description Tomas Hoger 2007-08-10 11:38:31 UTC
Off-by-one error in the fsp_readdir_r function in fsplib.c in fsplib before 0.9
allows remote attackers to cause a denial of service via a directory entry whose
length is exactly MAXNAMLEN, which prevents a terminating null byte from being
added.

gFTP contains local copy of fsplib source code to support FSP protocol.

Comment 1 Tomas Hoger 2007-08-10 11:40:27 UTC
Upstream patch:

http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.c?r1=1.19&r2=1.20


Comment 2 Mark J. Cox 2007-08-10 12:58:18 UTC
"Red Hat does not consider a user assisted client crash such as this to be a
security flaw."


Note You need to log in before you can comment on or make changes to this bug.