Heap-based buffer overflow in cgit - CVE-2012-4465
Published: October 10, 2012 / Updated: August 11, 2020
cgit
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the substr function in parsing.c in cgit 0.9.0.3 and earlier. A remote attacker can use an empty username in the to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2012-4465
Sources
- http://git.zx2c4.com/cgit/commit/?id=7757d1b046ecb67b830151d20715c658867df1ec
- http://hjemli.net/pipermail/cgit/2012-July/000652.html
- http://secunia.com/advisories/50734
- http://www.openwall.com/lists/oss-security/2012/09/30/1
- http://www.openwall.com/lists/oss-security/2012/10/03/7
- http://www.securityfocus.com/bid/55724
- https://bugzilla.redhat.com/show_bug.cgi?id=820733