Bug 251681 (CVE-2006-7221) - CVE-2006-7221 fsplib single zero byte overflow
Summary: CVE-2006-7221 fsplib single zero byte overflow
Status: CLOSED NOTABUG
Alias: CVE-2006-7221
Product: Security Response
Classification: Other
Component: vulnerability   
(Show other bugs)
Version: unspecified
Hardware: All Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: source=internet,reported=20070710,pub...
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-08-10 12:03 UTC by Tomas Hoger
Modified: 2007-08-10 13:10 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-08-10 13:10:19 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

Description Tomas Hoger 2007-08-10 12:03:36 UTC
Multiple off-by-one errors in fsplib.c in fsplib before 0.8 allow attackers to
cause a denial of service via unspecified vectors involving the (1) name and (2)
d_name entry attributes.

gFTP contains local copy of fsplib source code to support FSP protocol.

Comment 1 Tomas Hoger 2007-08-10 12:06:37 UTC
Upstream patch:

http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.c?r1=1.15&r2=1.16

Further information about the issue:

https://bugzilla.novell.com/show_bug.cgi?id=150399


Comment 2 Mark J. Cox 2007-08-10 13:10:19 UTC
"Red Hat does not consider a user assisted client crash such as this to be a
security flaw."


Note You need to log in before you can comment on or make changes to this bug.