[Japanese]

JVNDB-2025-001027

Linux Ratfor vulnerable to stack-based buffer overflow

Overview

Linux Ratfor provided by the Dimensional Gate contains a stack-based buffer overflow vulnerability (CWE-121).

Yuhei Kawakoya of NTT Social Informatics Laboratories / NTT Security Holdings Corporation reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 7.0 (High) [Other]
  • Attack Vector: Local
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
This assumes an attack scenario in which a victim user is directed to process a crafted ratfor source code with the affected product.
Affected Products


The Dimensional Gate Co.
  • Linux Ratfor 1.06 and earlier

Impact

When the software processes a special crafted file by an attacker, arbitrary code may be executed. As a result, the attacker may obtain or alter information of the user environment or cause the user environment to become unusable.
Solution

[Update the software]
Update the software to the latest version according to the information provided by the developer.
The developer has released the following versions that address the vulnerability.

* Linux Ratfor 1.07
Vendor Information

The Dimensional Gate Co.
CWE (What is CWE?)

  1. Stack-based Buffer Overflow(CWE-121) [Other]
CVE (What is CVE?)

  1. CVE-2024-55577
References

  1. JVN : JVNVU#92217718
Revision History

  • [2025/01/16]
      Web page was published