Vulnerability: OpenBSD Buffer Overflow

Secunia Security Advisories warns a vulnerability has been reported in OpenBSD, which can be exploited by malicious, local users to escalate their privileges or cause a DoS (Denial of Service).

The vulnerability is caused due to a boundary error in "compat_ibcs2". This can be exploited by running a specially crafted binary, which causes a buffer overflow.

More information about the vulnerability can be found at: http://www.secunia.com/advisories/10246/

Patches which address the flaw are available from:

OpenBSD 3.4: ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/i386/006_ibcs2.patch

OpenBSD 3.3: ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.3/i386/011_ibcs2.patch

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about OpenBSD

Show Comments