Bug 251681 - (CVE-2006-7221) CVE-2006-7221 fsplib single zero byte overflow
CVE-2006-7221 fsplib single zero byte overflow
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
source=internet,reported=20070710,pub...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2007-08-10 08:03 EDT by Tomas Hoger
Modified: 2007-08-10 09:10 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-08-10 09:10:19 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Tomas Hoger 2007-08-10 08:03:36 EDT
Multiple off-by-one errors in fsplib.c in fsplib before 0.8 allow attackers to
cause a denial of service via unspecified vectors involving the (1) name and (2)
d_name entry attributes.

gFTP contains local copy of fsplib source code to support FSP protocol.
Comment 1 Tomas Hoger 2007-08-10 08:06:37 EDT
Upstream patch:

http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.c?r1=1.15&r2=1.16

Further information about the issue:

https://bugzilla.novell.com/show_bug.cgi?id=150399
Comment 2 Mark J. Cox (Product Security) 2007-08-10 09:10:19 EDT
"Red Hat does not consider a user assisted client crash such as this to be a
security flaw."

Note You need to log in before you can comment on or make changes to this bug.