CVE Reference: CVE-2012-4409

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2012-4409

Description:
Stack-based buffer overflow in the check_file_head function in extra.c in mcrypt 2.6.8 and earlier allows user-assisted remote attackers to execute arbitrary code via an encrypted file with a crafted header containing long salt data that is not properly handled during decryption.

CVE Status:
Candidate

References:

ST
  1027532

SAID
  Secunia Advisory: SA50507
  Secunia Advisory: SA51010

MLIST
  http://www.openwall.com/lists/oss-security/2012/09/06/4

MISC
  http://packetstormsecurity.org/files/116268/mcrypt-2.6.8-Buffer-Overflow-Proof-Of-Concept.html

FEDORA
  http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086519.html
  http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087542.html
  http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088281.html

CONFIRM


Return to the previous page.