CVE-2012-4409

NameCVE-2012-4409
DescriptionStack-based buffer overflow in the check_file_head function in extra.c in mcrypt 2.6.8 and earlier allows user-assisted remote attackers to execute arbitrary code via an encrypted file with a crafted header containing long salt data that is not properly handled during decryption.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mcrypt (PTS)buster, bullseye2.6.8-4fixed
bookworm2.6.8-6fixed
sid, trixie2.6.8-7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mcryptsource(unstable)2.6.8-1.1

Notes

[squeeze] - mcrypt <no-dsa> (minor issue, it doesn't affect libmcrypt)
http://packetstormsecurity.org/files/116268/mcrypt-2.6.8-Buffer-Overflow-Proof-Of-Concept.html

Search for package or bug name: Reporting problems