| VID |
27333 |
| Severity |
40 |
| Port |
53696 |
| Protocol |
TCP |
| Class |
P2P |
| Detailed Description |
The Open DC hub, according to its version number, has a remote buffer overflow vulnerability. Open DC hub is a Unix/Linux version of the hub software for the Direct Connect network. Direct Connect is a peer-to-peer file sharing network made up by hubs, to which clients can connect. Open DC Hub version 0.7.14 and earlier are vulnerable to a buffer overflow, caused by improper handling of the $RedirectAll command. A remote attacker could exploit this vulnerability to execute arbitrary code on the affected system with administrative privileges.
* Note: This check solely relied on the version number of the remote Open DC hub to assess this vulnerability, so this might be a false positive.
* References: http://www.securityfocus.com/archive/1/382251 http://www.securityfocus.com/advisories/7565 http://packetstormsecurity.nl/exploits50.html http://www.linuxsecurity.com/index2.php?option=com_ content&do_pdf=1&id=106940 http://www.securityfocus.com/data/vulnerabilities/exploits/openDCHubBufferOverflowPOC.java http://www.autistici.org/fdonato/poc/OpenDcHub[0714]BOF-poc.zip
* Platforms Affected: Joohn, Open DC Hub 0.7.14 and earlier Unix Any version Linux Any version |
| Recommendation |
For Gentoo Linux: Upgrade to the latest version of opendchub (0.7.14-r2 or later), as listed in Gentoo Linux Security Advisory GLSA 200411-37 at http://www.gentoo.org/security/en/glsa/glsa-200411-37.xml
For other distributions: No upgrade or patch available as of December 2004. Upgrade to the new version of Open DC Hub, when new version fixed this problem becomes available from the SourceForge.net Web site at http://opendchub.sourceforge.net |
| Related URL |
CVE-2004-1127 (CVE) |
| Related URL |
11747 (SecurityFocus) |
| Related URL |
18254 (ISS) |
|