First published: Thu Oct 18 2012(Updated: )
Created <span class=""><a href="attachment.cgi?id=629285&action=diff" name="attach_629285" title="patch to fix the buffer overflow">attachment 629285</a> <a href="attachment.cgi?id=629285&action=edit" title="patch to fix the buffer overflow">[details]</a></span> patch to fix the buffer overflow Description of problem: A buffer overflow in mcrypt version 2.6.8 and earlier due to long filenames. If a user were tricked into attempting to encrypt/decrypt specially crafted long filename(s), this flaw would cause a stack-based buffer overflow that could potentially lead to arbitrary code execution. Note that this is caught by FORTIFY_SOURCE, which renders this to being a crash-only bug on Fedora. There are currently no upstream patches for this flaw. Version-Release number of selected component (if applicable): mcrypt-2.6.8-9.el6 (possibly others too). How reproducible: Run mcrypt with ~128 byte long file names.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libgcrypt | <=2.6.8 | |
Libgcrypt | =2.6.4 | |
Libgcrypt | =2.6.5 | |
Libgcrypt | =2.6.6 | |
Libgcrypt | =2.6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4527 is categorized as a high severity vulnerability due to the potential for buffer overflow exploits.
To fix CVE-2012-4527, update Mcrypt to a version higher than 2.6.8 or apply the relevant patches provided.
CVE-2012-4527 affects versions of Mcrypt up to and including 2.6.8, as well as specific versions 2.6.4, 2.6.5, 2.6.6, and 2.6.7.
Yes, if exploited, CVE-2012-4527 can potentially lead to data breaches through unauthorized access or data manipulation.
Yes, CVE-2012-4527 is a known vulnerability within the Mcrypt library and has been discussed in various security advisories.