blob: be8937f0934dad9973a0e7d2f100ab43394a1c03 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200411-19">
<title>Pavuk: Multiple buffer overflows</title>
Pavuk contains multiple buffer overflows that can allow a remote attacker
to run arbitrary code.
<product type="ebuild">pavuk</product>
<announced>November 10, 2004</announced>
<revised>November 10, 2004: 01</revised>
<package name="net-misc/pavuk" auto="yes" arch="*">
<unaffected range="ge">0.9.31</unaffected>
<vulnerable range="lt">0.9.31</vulnerable>
Pavuk is web spider and website mirroring tool.
Pavuk contains several buffer overflow vulnerabilities in the code handling digest authentication and HTTP header processing. This issue is similar to GLSA 200407-19, but contains more vulnerabilities.
<impact type="normal">
A remote attacker could cause a buffer overflow, leading to arbitrary code execution with the rights of the user running Pavuk.
There is no known workaround at this time.
All Pavuk users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/pavuk-0.9.31"</code>
<uri link="/security/en/glsa/glsa-200407-19.xml">GLSA-200407-19</uri>
<uri link="">SA13120</uri>
<uri link="">CAN-2004-0456</uri>
<metadata tag="requester" timestamp="Wed, 10 Nov 2004 07:00:44 +0000">
<metadata tag="submitter" timestamp="Wed, 10 Nov 2004 15:50:02 +0000">
<metadata tag="bugReady" timestamp="Wed, 10 Nov 2004 15:51:22 +0000">