Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2012-3368

Published: 3 July 2012

Integer signedness error in attach.c in dtach 0.8 allows remote attackers to obtain sensitive information from daemon stack memory in opportunistic circumstances by reading application data after an improper connection-close request, as demonstrated by running an IRC client in dtach.

Priority

Low

Status

Package Release Status
dtach
Launchpad, Ubuntu, Debian
hardy Ignored
(end of life)
lucid
Released (0.8-2ubuntu0.10.04.1)
natty Ignored
(end of life)
oneiric
Released (0.8-2ubuntu0.11.10.1)
precise
Released (0.8-2ubuntu0.12.04.1)
quantal Not vulnerable
(0.8-2.1)
upstream
Released (0.8-2.1)
Patches:
upstream: http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812