blob: 5e60c7384ec7e055724899c8a1f34a79fae0c58c [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200608-23">
<title>Heartbeat: Denial of Service</title>
Heartbeat is vulnerable to a Denial of Service which can be triggered by a
remote attacker without authentication.
<product type="ebuild">heartbeat</product>
<announced>August 24, 2006</announced>
<revised>September 22, 2006: 02</revised>
<package name="sys-cluster/heartbeat" auto="yes" arch="*">
<unaffected range="ge">2.0.7</unaffected>
<unaffected range="rge">1.2.5</unaffected>
<vulnerable range="lt">2.0.7</vulnerable>
Heartbeat is a component of the High-Availability Linux project. It is
used to perform death-of-node detection, communications and cluster
Yan Rong Ge discovered that the peel_netstring() function in
cl_netstring.c does not validate the "length" parameter of user input,
which can lead to an out-of-bounds memory access when processing
certain Heartbeat messages (CVE-2006-3121). Furthermore an unspecified
local DoS issue was fixed (CVE-2006-3815).
<impact type="normal">
By sending a malicious UDP Heartbeat message, even before
authentication, a remote attacker can crash the master control process
of the cluster.
There is no known workaround at this time.
All Heartbeat users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose sys-cluster/heartbeat</code>
<uri link="">CVE-2006-3121</uri>
<uri link="">CVE-2006-3815</uri>
<metadata tag="requester" timestamp="Sat, 19 Aug 2006 16:22:39 +0000">
<metadata tag="submitter" timestamp="Mon, 21 Aug 2006 14:22:38 +0000">
<metadata tag="bugReady" timestamp="Wed, 23 Aug 2006 14:19:23 +0000">