summaryrefslogtreecommitdiff
blob: 0316421b3729c481fa1b807e33f7a4345bfd0236 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200606-25">
  <title>Hashcash: Possible heap overflow</title>
  <synopsis>
    A heap overflow vulnerability in the Hashcash utility could allow an
    attacker to execute arbitrary code.
  </synopsis>
  <product type="ebuild">hashcash</product>
  <announced>2006-06-26</announced>
  <revised count="02">2006-07-29</revised>
  <bug>134960</bug>
  <access>remote</access>
  <affected>
    <package name="net-misc/hashcash" auto="yes" arch="*">
      <unaffected range="ge">1.21</unaffected>
      <vulnerable range="lt">1.21</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Hashcash is a utility for generating Hashcash tokens, a proof-of-work
    system to reduce the impact of spam.
    </p>
  </background>
  <description>
    <p>
    Andreas Seltenreich has reported a possible heap overflow in the
    array_push() function in hashcash.c, as a result of an incorrect amount
    of allocated memory for the "ARRAY" structure.
    </p>
  </description>
  <impact type="high">
    <p>
    By sending malicious entries to the Hashcash utility, an attacker may
    be able to cause an overflow, potentially resulting in the execution of
    arbitrary code with the privileges of the user running the application.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All Hashcash users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=net-misc/hashcash-1.21"</code>
  </resolution>
  <references>
    <uri link="http://www.hashcash.org/source/CHANGELOG">Hashcash ChangeLog</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3251">CVE-2006-3251</uri>
  </references>
  <metadata tag="requester" timestamp="2006-06-18T12:26:10Z">
    falco
  </metadata>
  <metadata tag="submitter" timestamp="2006-06-18T12:57:56Z">
    falco
  </metadata>
  <metadata tag="bugReady" timestamp="2006-06-23T18:48:20Z">
    falco
  </metadata>
</glsa>