[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#485944: linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data



Package: linux-2.6
Version: 2.6.22-6.lenny1
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for linux-2.6.

CVE-2008-1673[0]:
| The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6
| and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic
| modules; and (b) the gxsnmp package; does not properly validate length
| values during decoding of ASN.1 BER data, which allows remote
| attackers to cause a denial of service (crash) or execute arbitrary
| code via (1) a length greater than the working buffer, which can lead
| to an unspecified overflow; (2) an oid length of zero, which can lead
| to an off-by-one error; or (3) an indefinite length for a primitive
| encoding.

Patches are linked from the mitre site but I guess you will 
update to 2.6.25.5 anyway.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673
    http://security-tracker.debian.net/tracker/CVE-2008-1673

-- 
Nico Golde - http://www.ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgp0rdlnQ15Vm.pgp
Description: PGP signature


Reply to: