Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200503-12] Hashcash: Format string vulnerability


Vulnerability Assessment Details

[GLSA-200503-12] Hashcash: Format string vulnerability

Vulnerability Assessment Summary
Hashcash: Format string vulnerability

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200503-12
(Hashcash: Format string vulnerability)


Tavis Ormandy of the Gentoo Linux Security Audit Team identified a
flaw in the Hashcash utility that a possible hacker could expose by
specifying a malformed reply address.

Impact

Successful exploitation would permit a possible hacker to disrupt
Hashcash users, and potentially execute arbitrary code.

Workaround

There is no known workaround at this time.


Solution:
All Hashcash users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/hashcash-1.16-r1"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

USB 3.0 to SATA 2.5/3.5" HDD SSD Hard Drive External Enclosure Disk Case Box
$20.08
USB 3.0 to SATA 2.5/3.5SAMSUNG 840 Pro Series 2.5" 128GB SATA III MLC Internal Solid State Drive SSD
$38.99
SAMSUNG 840 Pro Series 2.5Gaming Computer Intel i3, 8GB RAM, GTX 1050 oc, 120gb SSD and 1tb Drive, Win10
$0.99
Gaming Computer Intel i3, 8GB RAM, GTX 1050 oc, 120gb SSD and 1tb Drive, Win10 pictureUSB 3.0 to Sata 2.5/3.5" HDD SSD Hard Drive Disk External Mobile Enclosure Case
$20.99
USB 3.0 to Sata 2.5/3.5


Discussions

No Discussions have been posted on this vulnerability.