blob: e2cde2516a825bcca295db6e25e81cd4b04426ee [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200606-25">
<title>Hashcash: Possible heap overflow</title>
<synopsis>
A heap overflow vulnerability in the Hashcash utility could allow an
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">hashcash</product>
<announced>June 26, 2006</announced>
<revised>July 29, 2006: 02</revised>
<bug>134960</bug>
<access>remote</access>
<affected>
<package name="net-misc/hashcash" auto="yes" arch="*">
<unaffected range="ge">1.21</unaffected>
<vulnerable range="lt">1.21</vulnerable>
</package>
</affected>
<background>
<p>
Hashcash is a utility for generating Hashcash tokens, a proof-of-work
system to reduce the impact of spam.
</p>
</background>
<description>
<p>
Andreas Seltenreich has reported a possible heap overflow in the
array_push() function in hashcash.c, as a result of an incorrect amount
of allocated memory for the "ARRAY" structure.
</p>
</description>
<impact type="high">
<p>
By sending malicious entries to the Hashcash utility, an attacker may
be able to cause an overflow, potentially resulting in the execution of
arbitrary code with the privileges of the user running the application.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time.
</p>
</workaround>
<resolution>
<p>
All Hashcash users should upgrade to the latest version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-misc/hashcash-1.21&quot;</code>
</resolution>
<references>
<uri link="http://www.hashcash.org/source/CHANGELOG">Hashcash ChangeLog</uri>
<uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3251">CVE-2006-3251</uri>
</references>
<metadata tag="requester" timestamp="Sun, 18 Jun 2006 12:26:10 +0000">
falco
</metadata>
<metadata tag="submitter" timestamp="Sun, 18 Jun 2006 12:57:56 +0000">
falco
</metadata>
<metadata tag="bugReady" timestamp="Fri, 23 Jun 2006 18:48:20 +0000">
falco
</metadata>
</glsa>