Red Hat Bugzilla – Bug 756341
CVE-2009-5028 namazu: Stack-based buffer overflow by replacing blank "uri" field value
Last modified: 2016-03-04 06:49:05 EST
A stack-based buffer overflow flaw was found in the way Namazu, a full-text search engine, performed URI replacement for certain found results of the query. If namazu was configured as a CGI script (WWW search engine), a remote attacker could provide a specially-crafted query (with blank value of the "uri" field), leading to namazu executable crash, or potentially, arbitrary code execution with the privileges of the user running namazu.
Further issue details from upstream security advisory :
"To 2.0.19 or a version that is older than 2.0.19, there is a vulnerability of overrunning in the buffer. It recommends since Namazu 2.0.20 to be used."
Relevant upstream patches:
This issue affects the version of the namazu package, as shipped with Fedora release of 14. Please schedule an update.
Created namazu tracking bugs for this issue
Affects: fedora-14 [bug 756350]
The CVE identifier of CVE-2009-5028 has been assigned to this issue: