Vulnerabilities > CVE-2007-2452 - Unspecified vulnerability in GNU Findutils
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN gnu
nessus
Summary
Heap-based buffer overflow in the visit_old_format function in locate/locate.c in locate in GNU findutils before 4.2.31 might allow context-dependent attackers to execute arbitrary code via a long pathname in a locate database that has the old format, a different vulnerability than CVE-2001-1036.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Nessus
NASL family | FreeBSD Local Security Checks |
NASL id | FREEBSD_PKG_7CA2A709103B11DC8E8200001CD613F9.NASL |
description | James Youngman reports : When GNU locate reads filenames from an old-format locate database, they are read into a fixed-length buffer allocated on the heap. Filenames longer than the 1026-byte buffer can cause a buffer overrun. The overrunning data can be chosen by any person able to control the names of filenames created on the local system. This will normally include all local users, but in many cases also remote users (for example in the case of FTP servers allowing uploads). |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25381 |
published | 2007-06-04 |
reporter | This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/25381 |
title | FreeBSD : findutils -- GNU locate heap buffer overrun (7ca2a709-103b-11dc-8e82-00001cd613f9) |
code |
|
Statements
contributor | Mark J Cox |
lastmodified | 2007-06-11 |
organization | Red Hat |
statement | Not vulnerable. Red Hat did not ship GNU locate in Red Hat Enterprise Linux 2.1, 3, 4, or 5. This issue does not affect the ’mlocate’ or ’slocate’ packages that are supplied with Red Hat Enterprise Linux. |
References
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://osvdb.org/36827
- http://osvdb.org/36827
- http://secunia.com/advisories/25477
- http://secunia.com/advisories/25477
- http://secunia.com/advisories/40551
- http://secunia.com/advisories/40551
- http://securityreason.com/securityalert/2760
- http://securityreason.com/securityalert/2760
- http://www.securityfocus.com/archive/1/470108/100/0/threaded
- http://www.securityfocus.com/archive/1/470108/100/0/threaded
- http://www.securityfocus.com/bid/24250
- http://www.securityfocus.com/bid/24250
- http://www.securitytracker.com/id?1018183
- http://www.securitytracker.com/id?1018183
- http://www.vupen.com/english/advisories/2007/2015
- http://www.vupen.com/english/advisories/2007/2015
- http://www.vupen.com/english/advisories/2010/1796
- http://www.vupen.com/english/advisories/2010/1796
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34628
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34628