---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: fsplib Multiple Vulnerabilities SECUNIA ADVISORY ID: SA26184 VERIFY ADVISORY: http://secunia.com/advisories/26184/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote SOFTWARE: fsplib 0.x http://secunia.com/product/14856/ DESCRIPTION: Some vulnerabilities in have been reported fsplib, which potentially can be exploited by malicious people to compromise an application using the library. 1) A boundary error exists in the processing of file names in fsp_readdir_native, which can be exploited to cause a stack-based buffer overflow if the defined MAXNAMLEN is bigger than 256. 2) A boundary error exists in the processing of directory entries in fsp_readdir, which can be exploited to cause a stack-based buffer overflow on systems with an insufficient size allocated for the d_name field of directory entries. Successful exploitation may allow execution of arbitrary code. NOTE: The fsp_readdir_r function does not properly NULL terminate the destination buffer when processing filenames that have MAXNAMLEN characters. SOLUTION: Update to version 0.9. http://sourceforge.net/project/showfiles.php?group_id=93841&package_id=139615&release_id=526638 PROVIDED AND/OR DISCOVERED BY: The vendor credits Kalle Olavi Niemitalo. ORIGINAL ADVISORY: http://fsp.cvs.sourceforge.net/fsp/fsplib/ChangeLog?revision=1.17&view=markup ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------