acpid.c in acpid before 2.0.9 does not properly handle a situation in which a process has connected to acpid.socket but is not reading any data, which allows local users to cause a denial of service (daemon hang) via a crafted application that performs a connect system call but no read system calls.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/45915 | vdb entry |
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059880.html | patch vendor advisory |
http://secunia.com/advisories/44621 | third party advisory vendor advisory |
http://secunia.com/advisories/42947 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2011/03/15/7 | mailing list exploit patch |
https://bugzilla.redhat.com/show_bug.cgi?id=688698 | patch |
http://www.openwall.com/lists/oss-security/2011/01/19/4 | mailing list exploit patch |
http://www.openwall.com/lists/oss-security/2011/03/15/12 | mailing list exploit patch |
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060053.html | patch vendor advisory |