NASM.Ppscan.Off.By.One.Buffer.Overflow

description-logoDescription

This indicates an attempt to exploit a Buffer Overflow vulnerability in NASM. The vulnerability is in the "ppscan" method.
The vulnerable application fails to perform adequate boundary checks on user supplied data. A successful attack may allow the attacker to execute arbitrary code on the vulnerable system.

affected-products-logoAffected Products

Ubuntu Ubuntu Linux 8.04 LTS sparc
Ubuntu Ubuntu Linux 8.04 LTS powerpc
Ubuntu Ubuntu Linux 8.04 LTS lpia
Ubuntu Ubuntu Linux 8.04 LTS i386
Ubuntu Ubuntu Linux 8.04 LTS amd64
NASM NASM 2.0.2
NASM NASM 2.0.1
NASM NASM 2.0
MandrakeSoft Linux Mandrake 2008.1 x86_64
MandrakeSoft Linux Mandrake 2008.1

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the websites:
Ubuntu Ubuntu Linux 8.04 LTS i386
Ubuntu nasm_0.99.06-2ubuntu0.1_i386.deb
Ubuntu Ubuntu Linux 8.04 LTS amd64
Ubuntu nasm_0.99.06-2ubuntu0.1_amd64.deb
Ubuntu Ubuntu Linux 8.04 LTS powerpc
Ubuntu nasm_0.99.06-2ubuntu0.1_powerpc.deb
Ubuntu Ubuntu Linux 8.04 LTS sparc
Ubuntu nasm_0.99.06-2ubuntu0.1_sparc.deb
Ubuntu Ubuntu Linux 8.04 LTS lpia
Ubuntu nasm_0.99.06-2ubuntu0.1_lpia.deb

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)