blob: ef393b11e2b45f8a4051e84e147a853c597d1c4f [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200501-44">
<title>ncpfs: Multiple vulnerabilities</title>
The ncpfs utilities contain multiple flaws, potentially resulting in the
remote execution of arbitrary code or local file access with elevated
<product type="ebuild">ncpfs</product>
<announced>January 30, 2005</announced>
<revised>January 30, 2005: 01</revised>
<access>remote and local</access>
<package name="net-fs/ncpfs" auto="yes" arch="*">
<unaffected range="ge">2.2.6</unaffected>
<vulnerable range="lt">2.2.6</vulnerable>
ncpfs is a NCP protocol network filesystem driver that allows
access to NetWare services, to mount volumes of NetWare servers or
print to NetWare print queues.
Erik Sjolund discovered two vulnerabilities in the programs
bundled with ncpfs: there is a potentially exploitable buffer overflow
in ncplogin (CAN-2005-0014), and due to a flaw in nwclient.c, utilities
using the NetWare client functions insecurely access files with
elevated privileges (CAN-2005-0013).
<impact type="normal">
The buffer overflow might allow a malicious remote NetWare server
to execute arbitrary code on the NetWare client. Furthermore, a local
attacker may be able to create links and access files with elevated
privileges using SUID ncpfs utilities.
There is no known workaround at this time.
All ncpfs users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-fs/ncpfs-2.2.6&quot;</code>
<uri link="">CAN-2005-0013</uri>
<uri link="">CAN-2005-0014</uri>
<uri link="">ncpfs ChangeLog</uri>
<metadata tag="requester" timestamp="Sat, 29 Jan 2005 09:02:48 +0000">
<metadata tag="bugReady" timestamp="Sat, 29 Jan 2005 11:01:37 +0000">
<metadata tag="submitter" timestamp="Sat, 29 Jan 2005 11:18:51 +0000">