First published: Wed Nov 23 2011(Updated: )
A stack-based buffer overflow flaw was found in the way Namazu, a full-text search engine, performed URI replacement for certain found results of the query. If namazu was configured as a CGI script (WWW search engine), a remote attacker could provide a specially-crafted query (with blank value of the "uri" field), leading to namazu executable crash, or potentially, arbitrary code execution with the privileges of the user running namazu. Further issue details from upstream security advisory [2]: "To 2.0.19 or a version that is older than 2.0.19, there is a vulnerability of overrunning in the buffer. It recommends since Namazu 2.0.20 to be used." References: [1] <a href="http://www.namazu.org/#news">http://www.namazu.org/#news</a> [2] <a href="http://www.namazu.org/security.html.en">http://www.namazu.org/security.html.en</a> Relevant upstream patches: [3] <a href="http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.86&r2=1.87&sortby=log">http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.86&r2=1.87&sortby=log</a> [4] <a href="http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.77.2.8&r2=1.77.2.9&sortby=log">http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.77.2.8&r2=1.77.2.9&sortby=log</a> [5] <a href="http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.59.8.28&r2=1.59.8.29&sortby=log">http://cvs.namazu.org/namazu/src/result.c?sortdir=down&r1=1.59.8.28&r2=1.59.8.29&sortby=log</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Namazu Namazu | =2.0.2 | |
Namazu Namazu | =2.0.17 | |
Namazu Namazu | =2.0.13 | |
Namazu Namazu | =2.0.14 | |
Namazu Namazu | <=2.0.19 | |
Namazu Namazu | =2.0.18 | |
Namazu Namazu | =2.0 | |
Namazu Namazu | =2.0.16 | |
Namazu Namazu | =2.0.15 | |
Namazu Namazu | =2.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.