ID CVE-2007-3961
Summary Off-by-one error in the fsp_readdir_r function in fsplib.c in fsplib before 0.9 allows remote attackers to cause a denial of service via a directory entry whose length is exactly MAXNAMELEN, which prevents a terminating null byte from being added. Vendor has supplied upgrade patch: http://sourceforge.net/project/showfiles.php?group_id=93841&package_id=139615&release_id=526638
References
Vulnerable Configurations
  • cpe:2.3:a:fsp:c_library:*:*:*:*:*:*:*:*
    cpe:2.3:a:fsp:c_library:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 15-11-2008 - 06:54)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
confirm
gentoo GLSA-200711-01
mandriva MDVSA-2008:018
misc http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.c?r1=1.19&r2=1.20
osvdb 38568
secunia
  • 26184
  • 26378
  • 27501
statements via4
contributor Mark J Cox
lastmodified 2007-08-10
organization Red Hat
statement Red Hat does not consider a user assisted client crash such as this to be a security flaw.
Last major update 15-11-2008 - 06:54
Published 25-07-2007 - 17:30
Last modified 15-11-2008 - 06:54
Back to Top