blob: daa6601c8848307ab41e12556a6a6ba807568370 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200405-15">
<title>cadaver heap-based buffer overflow</title>
There is a heap-based buffer overflow vulnerability in the neon library
used in cadaver, possibly leading to execution of arbitrary code when
connected to a malicious server.
<product type="ebuild">cadaver</product>
<announced>May 20, 2004</announced>
<revised>May 20, 2004: 01</revised>
<access>remote </access>
<package name="net-misc/cadaver" auto="yes" arch="*">
<unaffected range="ge">0.22.2</unaffected>
<vulnerable range="le">0.22.1</vulnerable>
cadaver is a command-line WebDAV client.
Stefan Esser discovered a vulnerability in the code of the neon library
(see GLSA 200405-13). This library is also included in cadaver.
<impact type="normal">
When connected to a malicious WebDAV server, this vulnerability could allow
remote execution of arbitrary code with the rights of the user running
There is no known workaround at this time. All users are advised to upgrade
to the latest available version of cadaver.
All users of cadaver should upgrade to the latest stable version:
# emerge sync
# emerge -pv ">=net-misc/cadaver-0.22.2"
# emerge ">=net-misc/cadaver-0.22.2"</code>
<uri link="">CAN-2004-0398</uri>
<uri link="/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
<metadata tag="submitter">