Two buffer overflow vulnerabilities in TPTEST may allow remote attackers to execute arbitrary code or cause Denial of Service.
Package | net-analyzer/tptest on all architectures |
---|---|
Affected versions | < 3.1.7-r2 |
Unaffected versions | >= 3.1.7-r2 |
TPTEST is a tool to measure the speed of a user’s Internet connection.
The GetStatsFromLine() function in TPTEST is vulnerable to buffer overflows from STATS lines with long email and pwd fields.
A remote attacker could send a specially-crafted STATS line, possibly resulting in arbitrary code execution or a Denial of Service condition.
There is no known workaround at this time.
All TPTEST users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/tptest-3.1.7-r2"
Release date
October 26, 2013
Latest revision
October 26, 2013: 1
Severity
normal
Exploitable
remote
Bugzilla entries