Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD; and (e) SearchIndexer.exe on Vista Enterprise.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/8163 | exploit |
http://www.securitytracker.com/id?1021818 | vdb entry |
http://securityreason.com/achievement_securityalert/60 | third party advisory |
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c.diff?r1=1.41%3Br2=1.42%3Bf=h | |
http://www.securityfocus.com/bid/34008 | vdb entry exploit |
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c | vendor advisory |
http://www.securityfocus.com/archive/1/501505/100/0/threaded | mailing list |