Pound format string vulnerability — GLSA 200405-08

There is a format string flaw in Pound, allowing remote execution of arbitrary code with the rights of the Pound process.

Affected packages

www-servers/pound on all architectures
Affected versions <= 1.5
Unaffected versions >= 1.6

Background

Pound is a reverse proxy, load balancer and HTTPS front-end. It allows to distribute the load on several web servers and offers a SSL wrapper for web servers that do not support SSL directly.

Description

A format string flaw in the processing of syslog messages was discovered and corrected in Pound.

Impact

This flaw may allow remote execution of arbitrary code with the rights of the Pound daemon process. By default, Gentoo uses the "nobody" user to run the Pound daemon.

Workaround

There is no known workaround at this time. All users are advised to upgrade to the latest available version of Pound.

Resolution

All users of Pound should upgrade to the latest stable version:

 # emerge sync
 
 # emerge -pv ">=www-servers/pound-1.6"
 # emerge ">=www-servers/pound-1.6"

References

Release date
May 18, 2004

Latest revision
May 22, 2006: 02

Severity
high

Exploitable
remote

Bugzilla entries