First published: Thu Sep 06 2012(Updated: )
A buffer overflow was reported [1],[2] in mcrypt version 2.6.8 and earlier due to a boundary error in the processing of an encrypted file (via the check_file_head() function in src/extra.c). If a user were tricked into attempting to decrypt a specially-crafted .nc encrypted flie, this flaw would cause a stack-based buffer overflow that could potentially lead to arbitrary code execution. Note that this is caught by FORTIFY_SOURCE, which renders this to being a crash-only bug on Fedora. There is currently no upstream patches for this flaw. [1] <a href="https://secunia.com/advisories/50507/">https://secunia.com/advisories/50507/</a> [2] <a href="https://bugs.gentoo.org/show_bug.cgi?id=434112">https://bugs.gentoo.org/show_bug.cgi?id=434112</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Libgcrypt | <2.6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-855029 is classified as high due to the potential for remote code execution resulting from a buffer overflow.
To fix REDHAT-BUG-855029, update mcrypt to the latest version that is higher than 2.6.8.
Versions of mcrypt prior to 2.6.8 are affected by REDHAT-BUG-855029.
REDHAT-BUG-855029 is a buffer overflow vulnerability in the mcrypt software.
The check_file_head() function in REDHAT-BUG-855029 is responsible for processing encrypted files, and it is where the boundary error occurs.