blob: 6d2307e2cf681866ca338865e5145a6e2bb653e0 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200407-19">
<title>Pavuk: Digest authentication helper buffer overflow</title>
Pavuk contains a bug that can allow an attacker to run arbitrary code.
<product type="ebuild">Pavuk</product>
<announced>July 26, 2004</announced>
<revised>May 22, 2006: 02</revised>
<package name="net-misc/pavuk" auto="yes" arch="*">
<unaffected range="ge">0.9.28-r3</unaffected>
<vulnerable range="le">0.9.28-r2</vulnerable>
Pavuk is web spider and website mirroring tool.
Pavuk contains several buffer overflow vulnerabilities in the code
handling digest authentication.
<impact type="normal">
An attacker could cause a buffer overflow, leading to arbitrary code
execution with the rights of the user running Pavuk.
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version of Pavuk.
All Pavuk users should upgrade to the latest version:
# emerge sync
# emerge -pv &quot;&gt;=net-misc/pavuk-0.9.28-r3&quot;
# emerge &quot;&gt;=net-misc/pavuk-0.9.28-r3&quot;</code>
<uri link="">CVE-2004-1437</uri>
<metadata tag="submitter">