CVE-2010-1938
Publication date 28 May 2010
Last updated 24 July 2024
Ubuntu priority
Off-by-one error in the __opiereadrec function in readrec.c in libopie in OPIE 2.4.1-test1 and earlier, as used on FreeBSD 6.4 through 8.1-PRERELEASE and other platforms, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long username, as demonstrated by a long USER command to the FreeBSD 8.0 ftpd.
Status
Package | Ubuntu Release | Status |
---|---|---|
opie | 10.04 LTS lucid |
Fixed 2.40~dfsg-0ubuntu1.10.04.1
|
9.10 karmic |
Fixed 2.40~dfsg-0ubuntu1.9.10.1
|
|
9.04 jaunty |
Fixed 2.40~dfsg-0ubuntu1.9.04.1
|
|
8.04 LTS hardy |
Not affected
|
|
6.06 LTS dapper |
Not affected
|
Notes
mdeslaur
in dapper and hardy, the off-by-one overflows into *c, which isn’t used after in the function, so it’s harmless. on jaunty+, fortify source makes opie abort, so it is a denial of service.
Patch details
Package | Patch details |
---|---|
opie |