Think you have a false positive on this rule?

Sid 1-17155

Message

SERVER-OTHER Multiple vendors OPIE off-by-one stack buffer overflow attempt

Summary

Off-by-one error in the __opiereadrec function in readrec.c in libopie in OPIE 2.4.1-test1 and earlier, as used on FreeBSD 6.4 through 8.1-PRERELEASE and other platforms, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long username, as demonstrated by a long USER command to the FreeBSD 8.0 ftpd.

Impact

CVSS base score 9.3 CVSS impact score 10.0 CVSS exploitability score 8.6 confidentialityImpact COMPLETE integrityImpact COMPLETE availabilityImpact COMPLETE

CVE-2010-1938:

CVSS base score 9.3

CVSS impact score 10.0

CVSS exploitability score 8.6

Confidentiality Impact COMPLETE

Integrity Impact COMPLETE

Availability Impact COMPLETE

Detailed information

CVE-2010-1938: Off-by-one error in the __opiereadrec function in readrec.c in libopie in OPIE 2.4.1-test1 and earlier, as used on FreeBSD 6.4 through 8.1-PRERELEASE and other platforms, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long username, as demonstrated by a long USER command to the FreeBSD 8.0 ftpd.

Affected systems

  • nrl opie 2.2
  • nrl opie 2.3
  • nrl opie 2.4
  • nrl opie 2.4.1
  • nrl opie 2.10
  • nrl opie 2.11
  • nrl opie 2.21
  • nrl opie 2.22
  • nrl opie 2.32
  • freebsd freebsd 6
  • freebsd freebsd 6.4
  • freebsd freebsd 7.0
  • freebsd freebsd 7.0-release
  • freebsd freebsd 7.0_beta4
  • freebsd freebsd 7.0_releng
  • freebsd freebsd 7.1
  • freebsd freebsd 7.2
  • freebsd freebsd 8.0
  • freebsd freebsd 8.1-prerelease

Ease of attack

CVE-2010-1938:

Access Vector NETWORK

Access Complexity MEDIUM

Authentication NONE

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References

  • osvdb.org/show/osvdb/64949