A buffer overflow was reported [1],[2] in mcrypt version 2.6.8 and earlier due to a boundary error in the processing of an encrypted file (via the check_file_head() function in src/extra.c). If a user were tricked into attempting to decrypt a specially-crafted .nc encrypted flie, this flaw would cause a stack-based buffer overflow that could potentially lead to arbitrary code execution. Note that this is caught by FORTIFY_SOURCE, which renders this to being a crash-only bug on Fedora. There is currently no upstream patches for this flaw. [1] https://secunia.com/advisories/50507/ [2] https://bugs.gentoo.org/show_bug.cgi?id=434112
Created mcrypt tracking bugs for this issue Affects: fedora-all [bug 855030] Affects: epel-all [bug 855031]
CVE requested: http://www.openwall.com/lists/oss-security/2012/09/06/1
CVE-2012-4409 assigned: http://www.openwall.com/lists/oss-security/2012/09/06/4
Preliminary patches and further info are here: http://www.openwall.com/lists/oss-security/2012/09/06/8 It also has a fix for some format string issues as well, which should be applied as well.
mcrypt-2.6.8-9.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
mcrypt-2.6.8-9.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
mcrypt-2.6.8-9.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
mcrypt-2.6.8-9.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
mcrypt-2.6.8-9.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.