blob: 611c6c283b84c1270ecdf81bb73c369d50d3c622 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200503-12">
<title>Hashcash: Format string vulnerability</title>
A format string vulnerability in the Hashcash utility could allow an
attacker to execute arbitrary code.
<product type="ebuild">Hashcash</product>
<announced>March 06, 2005</announced>
<revised>May 22, 2006: 02</revised>
<package name="net-misc/hashcash" auto="yes" arch="*">
<unaffected range="ge">1.16-r1</unaffected>
<vulnerable range="lt">1.16-r1</vulnerable>
Hashcash is a utility for generating Hashcash tokens, a proof-of-work
system to reduce the impact of spam.
Tavis Ormandy of the Gentoo Linux Security Audit Team identified a flaw
in the Hashcash utility that an attacker could expose by specifying a
malformed reply address.
<impact type="normal">
Successful exploitation would permit an attacker to disrupt Hashcash
users, and potentially execute arbitrary code.
There is no known workaround at this time.
All Hashcash users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-misc/hashcash-1.16-r1&quot;</code>
<uri link="">CVE-2005-0687</uri>
<metadata tag="requester" timestamp="Wed, 2 Mar 2005 21:44:06 +0000">
<metadata tag="submitter" timestamp="Wed, 2 Mar 2005 22:42:04 +0000">
<metadata tag="bugReady" timestamp="Sun, 6 Mar 2005 10:00:09 +0000">