First published: Sat Jan 14 2012(Updated: )
From Andy Lutomirski The attached Python script will segfault tcsd. This particular vulnerability is a read from an attacker-controlled address, so getting anything more severe than information disclosure out of it may be difficult. But there is a lot of fishy input validation, and it may be possible to persuade the code to write out of bounds as well. It is certainly possible to cause memory allocation failures, but I haven't seen one that's unchecked yet. Upstream report (currently private) here: <a href="https://sourceforge.net/tracker/?func=detail&atid=704358&aid=3473554&group_id=126012">https://sourceforge.net/tracker/?func=detail&atid=704358&aid=3473554&group_id=126012</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/trousers | <0.3.9 | 0.3.9 |
Trousers | <=0.3.9 | |
Trousers | =0.2.8 | |
Trousers | =0.2.9 | |
Trousers | =0.2.9.1 | |
Trousers | =0.2.9.2 | |
Trousers | =0.3.0 | |
Trousers | =0.3.1 | |
Trousers | =0.3.2 | |
Trousers | =0.3.3 | |
Trousers | =0.3.4 | |
Trousers | =0.3.5 | |
Trousers | =0.3.6 | |
Trousers | =0.3.7 | |
Trousers | =0.3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0698 has a low severity due to its limited impact primarily resulting in a segmentation fault.
To fix CVE-2012-0698, update the TrouSerS package to version 0.3.9 or later.
CVE-2012-0698 affects multiple versions of the TrouSerS package, specifically versions up to 0.3.9.
CVE-2012-0698 does not appear to facilitate data loss but may result in an application crash.
CVE-2012-0698 is not considered remotely exploitable since it requires local access to trigger the vulnerability.