Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA228] DSA-228-1 libmcrypt


Vulnerability Assessment Details

[DSA228] DSA-228-1 libmcrypt

Vulnerability Assessment Summary
DSA-228-1 libmcrypt

Detailed Explanation for this Vulnerability Assessment

Ilia Alshanetsky discovered several buffer overflows in libmcrypt, a
decryption and encryption library, that originates from improper or
lacking input validation. By passing input which is longer than
expected to a number of functions (multiple functions are affected)
the user can successfully make libmcrypt crash and may be able to insert
arbitrary, malicious code which will be executed under the user
libmcrypt runs as, e.g. inside a web server.
Another vulnerability exists in the way libmcrypt loads algorithms via
libtool. When different algorithms are loaded dynamically, each time
an algorithm is loaded a small part of memory is leaked. In a
persistent environment (web server) this could lead to a memory
exhaustion attack that will exhaust all available memory by launching
repeated requests at an application utilizing the mcrypt library.
For the current stable distribution (woody) these problems have been
fixed in version 2.5.0-1woody1.
The old stable distribution (potato) does not contain libmcrypt packages.
For the unstable distribution (sid) these problems have been fixed in
version 2.5.5-1.
We recommend that you upgrade your libmcrypt packages.


Solution : http://www.debian.org/security/2003/dsa-228
Network Security Threat Level: High

Networks Security ID: 6510, 6512

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Areca ARC-1210 4-ports(4x 7pin SATA)PCIe SATA-II RAID Controller New
$95.0
Areca ARC-1210 4-ports(4x 7pin SATA)PCIe SATA-II RAID Controller New pictureAdaptec AAA-131U2/2MB RAID host adapter w/Adaptec14813 memory module Open Box
$20.0
Adaptec AAA-131U2/2MB RAID host adapter w/Adaptec14813 memory module Open Box pictureLSI SAS9212-4i4e 6Gb/s PCI-e SAS/SATA RAID Controller IBM 68y7354
$65.0
LSI SAS9212-4i4e 6Gb/s PCI-e SAS/SATA RAID Controller  IBM 68y7354 pictureDELL RAID PERC 5I SAS CONTROLLER 256MB E2K-UCP-51 and Battery
$9.99
DELL RAID PERC 5I SAS CONTROLLER 256MB E2K-UCP-51 and Battery picture


Discussions

No Discussions have been posted on this vulnerability.