Vigil@nce - e2fsprogs: buffer overflow via ext2fs_flush2
March 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can generate a buffer overflow in e2fsprogs, in order
to trigger a denial of service, and possibly to execute code.
Impacted products: Debian, Fedora, Ubuntu, Unix (platform)
Severity: 2/4
Creation date: 23/02/2015
DESCRIPTION OF THE VULNERABILITY
The e2fsprogs suite contains tools to manipulate ext2, ext3 and
ext4 filesystems.
However, if a file system contains a field s_first_meta_bg too
large, an overflow occurs in the ext2fs_flush2() function.
This vulnerability is due to an incomplete fix for
VIGILANCE-VUL-16120.
An attacker can therefore generate a buffer overflow in e2fsprogs,
in order to trigger a denial of service, and possibly to execute
code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/e2fsprogs-buffer-overflow-via-ext2fs-flush2-16235