ncpfs: Buffer overflow in ncplogin and ncpmap — GLSA 200412-09

ncpfs is vulnerable to a buffer overflow that could lead to local execution of arbitrary code with elevated privileges.

Affected packages

net-fs/ncpfs on all architectures
Affected versions < 2.2.5
Unaffected versions >= 2.2.5

Background

ncpfs is a NCP protocol network filesystem that allows access to Netware services, for example to mount volumes of NetWare servers or print to NetWare print queues.

Description

Karol Wiesek discovered a buffer overflow in the handling of the '-T' option in the ncplogin and ncpmap utilities, which are both installed as SUID root by default.

Impact

A local attacker could trigger the buffer overflow by calling one of these utilities with a carefully crafted command line, potentially resulting in execution of arbitrary code with root privileges.

Workaround

There is no known workaround at this time.

Resolution

All ncpfs users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-fs/ncpfs-2.2.5"

References

Release date
December 15, 2004

Latest revision
December 15, 2004: 01

Severity
high

Exploitable
local

Bugzilla entries