The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Multiple libmcrypt vulnerabilities


<< Previous INDEX Search src / Print Next >>
Date: Fri, 3 Jan 2003 15:41:24 -0500
From: "Ilia A." <ilia@prohost.org.>
To: [email protected]
Subject: Multiple libmcrypt vulnerabilities

limbcrypt versions prior to 2.5.5 contain a number of buffer overflow 
vulnerabilities that stem from imporper or lacking input validation. By 
passing a longer then expected input to a number of functions (multiple 
functions are affected) the user can successful make libmcrypt crash.

Another vulnerability is due to the way libmcrypt loads algorithms via 
libtool. When the algorithms are loaded dynamically the each time the 
algorithm is loaded a small (few kilobytes) of memory are leaked. In a 
persistant enviroment (web server) this could lead to a memory exhaustion 
attack that will exhaust all avaliable memory by launching repeated requests 
at an application utilizing the mcrypt library.

The solution to both of these problem is to upgrade to the latest release of 
libmcrypt, 2.5.5.


Ilia Alshanetsky


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру