diff --git a/nas-1.9.3-CVE-2013-4256-1.patch b/nas-1.9.3-CVE-2013-4256-1.patch new file mode 100644 index 0000000..3a37e22 --- /dev/null +++ b/nas-1.9.3-CVE-2013-4256-1.patch @@ -0,0 +1,63 @@ +------------------------------------------------------------------------ +r287 | auerswald | 2013-08-09 19:19:13 +0200 (Pá, 09 srp 2013) | 18 lines + +Accept only possible values for listen port offset of nasd. + +Verify that the listen port offset specified as a command line argument +to nasd is a non-negative number that will result in a valid TCP port +number if added to AU_DEFAULT_TCP_PORT (currently 8000). + +Specifying a long argument starting with a colon would otherwise result +in buffer overflows later on. + +The problem was reported to the nas mailing list by +Hamid Zamani , together with other vulnerabilities +in NAS 1.9.3: + +http://radscan.com/pipermail/nas/2013-August/001270.html + +[Adding bounds checks to the string operations is still needed to guarantee +they do not overflow.] + +------------------------------------------------------------------------ +Index: server/os/utils.c +=================================================================== +--- server/os/utils.c (revision 286) ++++ server/os/utils.c (revision 287) +@@ -50,6 +50,9 @@ + + #include