A heap-based buffer overflow flaw was found in the way upsd server of NUT, a network UPS tools suite, processed non-printable characters, being present in data received from the network. A remote attacker could provide a specially-crafted packet, that when processed by the upsd server would lead to upsd executable crash, or, potentially arbitrary code execution with the privileges of the user running upsd. References: [1] http://trac.networkupstools.org/projects/nut/changeset/3633 [2] https://alioth.debian.org/tracker/index.php?func=detail&aid=313636&group_id=30602&atid=411542
Public via: [3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=675203
Created nut tracking bugs for this issue Affects: fedora-all [bug 826933] Affects: epel-all [bug 826934]
nut-2.6.3-4.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
nut-2.6.3-4.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
nut-2.6.3-4.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
nut-2.2.2-3.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
nut-2.6.3-4.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.