First published: Sat Jan 14 2012(Updated: )
From Andy Lutomirski The attached Python script will segfault tcsd. This particular vulnerability is a read from an attacker-controlled address, so getting anything more severe than information disclosure out of it may be difficult. But there is a lot of fishy input validation, and it may be possible to persuade the code to write out of bounds as well. It is certainly possible to cause memory allocation failures, but I haven't seen one that's unchecked yet. Upstream report (currently private) here: <a href="https://sourceforge.net/tracker/?func=detail&atid=704358&aid=3473554&group_id=126012">https://sourceforge.net/tracker/?func=detail&atid=704358&aid=3473554&group_id=126012</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trustedcomputinggroup Trousers | <=0.3.9 | |
Trustedcomputinggroup Trousers | =0.2.8 | |
Trustedcomputinggroup Trousers | =0.2.9 | |
Trustedcomputinggroup Trousers | =0.2.9.1 | |
Trustedcomputinggroup Trousers | =0.2.9.2 | |
Trustedcomputinggroup Trousers | =0.3.0 | |
Trustedcomputinggroup Trousers | =0.3.1 | |
Trustedcomputinggroup Trousers | =0.3.2 | |
Trustedcomputinggroup Trousers | =0.3.3 | |
Trustedcomputinggroup Trousers | =0.3.4 | |
Trustedcomputinggroup Trousers | =0.3.5 | |
Trustedcomputinggroup Trousers | =0.3.6 | |
Trustedcomputinggroup Trousers | =0.3.7 | |
Trustedcomputinggroup Trousers | =0.3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.