CVE-2010-1938

Publication date 28 May 2010

Last updated 24 July 2024


Ubuntu priority

Off-by-one error in the __opiereadrec function in readrec.c in libopie in OPIE 2.4.1-test1 and earlier, as used on FreeBSD 6.4 through 8.1-PRERELEASE and other platforms, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long username, as demonstrated by a long USER command to the FreeBSD 8.0 ftpd.

Read the notes from the security team

Status

Package Ubuntu Release Status
opie 10.04 LTS lucid
Fixed 2.40~dfsg-0ubuntu1.10.04.1
9.10 karmic
Fixed 2.40~dfsg-0ubuntu1.9.10.1
9.04 jaunty
Fixed 2.40~dfsg-0ubuntu1.9.04.1
8.04 LTS hardy
Not affected
6.06 LTS dapper
Not affected

Notes


mdeslaur

in dapper and hardy, the off-by-one overflows into *c, which isn't used after in the function, so it's harmless. on jaunty+, fortify source makes opie abort, so it is a denial of service.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
opie

References

Related Ubuntu Security Notices (USN)

    • USN-955-2
    • libpam-opie vulnerability
    • 21 June 2010

Other references