First published: Thu Sep 06 2012(Updated: )
A buffer overflow was reported [1],[2] in mcrypt version 2.6.8 and earlier due to a boundary error in the processing of an encrypted file (via the check_file_head() function in src/extra.c). If a user were tricked into attempting to decrypt a specially-crafted .nc encrypted flie, this flaw would cause a stack-based buffer overflow that could potentially lead to arbitrary code execution. Note that this is caught by FORTIFY_SOURCE, which renders this to being a crash-only bug on Fedora. There is currently no upstream patches for this flaw. [1] <a href="https://secunia.com/advisories/50507/">https://secunia.com/advisories/50507/</a> [2] <a href="https://bugs.gentoo.org/show_bug.cgi?id=434112">https://bugs.gentoo.org/show_bug.cgi?id=434112</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libgcrypt | <=2.6.8 | |
Libgcrypt | =2.6.4 | |
Libgcrypt | =2.6.5 | |
Libgcrypt | =2.6.6 | |
Libgcrypt | =2.6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4409 is classified as a high severity vulnerability due to its potential to cause a buffer overflow leading to application crashes or remote code execution.
To mitigate CVE-2012-4409, you should upgrade to mcrypt version 2.6.9 or later, where the vulnerability has been patched.
CVE-2012-4409 affects mcrypt versions 2.6.8 and earlier, specifically 2.6.4 through 2.6.8.
Exploitation of CVE-2012-4409 could allow an attacker to execute arbitrary code on the victim's machine, potentially leading to data compromise.
CVE-2012-4409 occurs due to a buffer overflow vulnerability in the check_file_head() function, which mishandles encrypted files.