what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-165

Mandriva Linux Security Advisory 2010-165
Posted Aug 30, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-165 - Heap-based buffer overflow in the HX_split function in string.c in libHX before 3.6 allows remote attackers to execute arbitrary code or cause a denial of service via a string that is inconsistent with the expected number of fields. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2010-2947
SHA-256 | 7c17832ce2648dd5df2b0c1c15a0b95e4de8654ea3c56acabf9bf515866c5190

Mandriva Linux Security Advisory 2010-165

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:165
http://www.mandriva.com/security/
_______________________________________________________________________

Package : libHX
Date : August 30, 2010
Affected: 2009.0, 2009.1, 2010.0, 2010.1
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in libHX:

Heap-based buffer overflow in the HX_split function in string.c in
libHX before 3.6 allows remote attackers to execute arbitrary code
or cause a denial of service (application crash) via a string that
is inconsistent with the expected number of fields (CVE-2010-2947).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2947
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2009.0:
30879036b694a7d19cdb41640f0dea83 2009.0/i586/libHX14-1.25-1.1mdv2009.0.i586.rpm
e78b8e20bb8359d09381f4293f312ab9 2009.0/i586/libHX-devel-1.25-1.1mdv2009.0.i586.rpm
17ed58aeb3106050af508863e7bb532c 2009.0/SRPMS/libHX-1.25-1.1mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
55008cab5dbe805f3f7aa66587158196 2009.0/x86_64/lib64HX14-1.25-1.1mdv2009.0.x86_64.rpm
0cb4a0ec66a254b97b1113d588c8b507 2009.0/x86_64/lib64HX-devel-1.25-1.1mdv2009.0.x86_64.rpm
17ed58aeb3106050af508863e7bb532c 2009.0/SRPMS/libHX-1.25-1.1mdv2009.0.src.rpm

Mandriva Linux 2009.1:
4d9273cc8b1abde9cb3f75354cd9b865 2009.1/i586/libHX18-2.5-1.1mdv2009.1.i586.rpm
d3cacba167a201ac52eec92e7db6b57c 2009.1/i586/libHX-devel-2.5-1.1mdv2009.1.i586.rpm
281f161c5eef405a789ef0602ccc383a 2009.1/SRPMS/libHX-2.5-1.1mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
abef150f002c13004b75703d7fdfe99c 2009.1/x86_64/lib64HX18-2.5-1.1mdv2009.1.x86_64.rpm
472c31715d26dda438737aec2ab949da 2009.1/x86_64/lib64HX-devel-2.5-1.1mdv2009.1.x86_64.rpm
281f161c5eef405a789ef0602ccc383a 2009.1/SRPMS/libHX-2.5-1.1mdv2009.1.src.rpm

Mandriva Linux 2010.0:
8564662c69f7b7ba3705ee8d92bf2d21 2010.0/i586/libHX22-3.1-1.1mdv2010.0.i586.rpm
7f5c8dd865e4d7cd3778eaba70015236 2010.0/i586/libHX-devel-3.1-1.1mdv2010.0.i586.rpm
68d99c38037ea381b61d443f0b96ddd7 2010.0/SRPMS/libHX-3.1-1.1mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
dc715e9a946b953224601d1816e32227 2010.0/x86_64/lib64HX22-3.1-1.1mdv2010.0.x86_64.rpm
24f85c289c653773cbeb4f12dbbc1c1d 2010.0/x86_64/lib64HX-devel-3.1-1.1mdv2010.0.x86_64.rpm
68d99c38037ea381b61d443f0b96ddd7 2010.0/SRPMS/libHX-3.1-1.1mdv2010.0.src.rpm

Mandriva Linux 2010.1:
21f3bfeb5a3f5b617d815e8df47cf04d 2010.1/i586/libHX22-3.4-1.1mdv2010.1.i586.rpm
2ae34a52ba376791751993b2d4506e0e 2010.1/i586/libHX-devel-3.4-1.1mdv2010.1.i586.rpm
31f0088e48f6618b98698b2667109f5b 2010.1/SRPMS/libHX-3.4-1.1mdv2010.1.src.rpm

Mandriva Linux 2010.1/X86_64:
4ebf4624bb4f74af9e84ded9ed5fa0d1 2010.1/x86_64/lib64HX22-3.4-1.1mdv2010.1.x86_64.rpm
ab0e62cdebc3da684b75956b0924d653 2010.1/x86_64/lib64HX-devel-3.4-1.1mdv2010.1.x86_64.rpm
31f0088e48f6618b98698b2667109f5b 2010.1/SRPMS/libHX-3.4-1.1mdv2010.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFMe7PcmqjQ0CJFipgRAuIbAJ9PqAKW7iPFNmdZ9aHnSCtxLP90zQCfag9i
2e/ZLxygKIWXbddiAlluJWo=
=mI22
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close