blob: fde634f0ec895039cedf9011126839114804c501 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200701-17">
<title>libgtop: Privilege escalation</title>
libgtop improperly handles filenames, possibly allowing for the execution
of arbitrary code.
<product type="ebuild">libgtop</product>
<announced>January 23, 2007</announced>
<revised>January 23, 2007: 01</revised>
<package name="gnome-base/libgtop" auto="yes" arch="*">
<unaffected range="ge">2.14.6</unaffected>
<vulnerable range="lt">2.14.6</vulnerable>
libgtop facilitates the libgtop_daemon, which is used by GNOME to
obtain information about remote systems.
Liu Qishuai discovered that glibtop_get_proc_map_s() in
sysdeps/linux/procmap.c does not properly allocate memory for storing a
filename, allowing certain filenames to cause the buffer to overflow on
the stack.
<impact type="normal">
By tricking a victim into executing an application that uses the
libgtop library (e.g. libgtop_daemon or gnome-system-monitor), a local
attacker could specify a specially crafted filename to be used by
libgtop causing a buffer overflow and possibly execute arbitrary code
with the rights of the user running the application.
There is no known workaround at this time.
All libgtop users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=gnome-base/libgtop-2.14.6&quot;</code>
<uri link="">CVE-2007-0235</uri>
<metadata tag="requester" timestamp="Wed, 17 Jan 2007 22:40:30 +0000">
<metadata tag="submitter" timestamp="Thu, 18 Jan 2007 17:24:28 +0000">
<metadata tag="bugReady" timestamp="Mon, 22 Jan 2007 12:14:40 +0000">