A stack-based buffer overflow flaw was found in the way Namazu, a full-text search engine, performed URI replacement for certain found results of the query. If namazu was configured as a CGI script (WWW search engine), a remote attacker could provide a specially-crafted query (with blank value of the "uri" field), leading to namazu executable crash, or potentially, arbitrary code execution with the privileges of the user running namazu. Further issue details from upstream security advisory [2]: "To 2.0.19 or a version that is older than 2.0.19, there is a vulnerability of overrunning in the buffer. It recommends since Namazu 2.0.20 to be used." References: [1] http://www.namazu.org/#news [2] http://www.namazu.org/security.html.en Relevant upstream patches: [3] http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.86&r2=1.87&sortby=log [4] http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.77.2.8&r2=1.77.2.9&sortby=log [5] http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.59.8.28&r2=1.59.8.29&sortby=log
This issue affects the version of the namazu package, as shipped with Fedora release of 14. Please schedule an update.
Created namazu tracking bugs for this issue Affects: fedora-14 [bug 756350]
CVE request: [6] http://www.openwall.com/lists/oss-security/2011/11/23/2
The CVE identifier of CVE-2009-5028 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2011/11/23/8