Bug#448763: CVE-2007-5690 Buffer overflow in sethdlc.c

Nico Golde nion at debian.org
Wed Oct 31 18:44:13 UTC 2007


Package: zaptel
Severity: normal
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for zaptel.

CVE-2007-5690[0]:
| Buffer overflow in sethdlc.c in the Asterisk Zaptel 1.4.5.1 might
| allow local users to gain privileges via a long device name (interface
| name) in the ifr_name field.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

This is not really a security problem in Debian since
sethdlc-new is not suid root so it will just segfault.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5690

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-voip-maintainers/attachments/20071031/0b8153f0/attachment.pgp 


More information about the Pkg-voip-maintainers mailing list