CVE-2012-0065
Published: 27 January 2012
Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.
Notes
Author | Note |
---|---|
jdstrand | Ubuntu 10.10 and lower not affected |
Priority
Status
Package | Release | Status |
---|---|---|
usbmuxd Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Not vulnerable
(1.0.2-1ubuntu2)
|
|
maverick |
Not vulnerable
(1.0.4-1)
|
|
natty |
Released
(1.0.7-1ubuntu0.11.04.1)
|
|
oneiric |
Released
(1.0.7-1ubuntu0.11.10.1)
|
|
upstream |
Released
(1.0.7-2)
|
|
Patches: upstream: http://cgit.sukimashita.com/usbmuxd.git/commit/?id=8968476bb5262d8aef20cb199337b174d338beb8 debdiff: https://bugs.launchpad.net/ubuntu/+source/usbmuxd/+bug/919435 |