Two buffer overflow vulnerabilities in TPTEST may allow remote attackers to execute arbitrary code or cause Denial of Service.
|Package||net-analyzer/tptest on all architectures|
|Affected versions||< 3.1.7-r2|
|Unaffected versions||>= 3.1.7-r2|
TPTEST is a tool to measure the speed of a user’s Internet connection.
The GetStatsFromLine() function in TPTEST is vulnerable to buffer overflows from STATS lines with long email and pwd fields.
A remote attacker could send a specially-crafted STATS line, possibly resulting in arbitrary code execution or a Denial of Service condition.
There is no known workaround at this time.
All TPTEST users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/tptest-3.1.7-r2"
October 26, 2013
October 26, 2013: 1