Bugtraq mailing list archives
[Gael Duval <gduval () mandrakesoft com>] [Security Announce] cdrecord
From: chmouel () MANDRAKESOFT COM (Chmouel Boudjnah)
Date: Sat, 3 Jun 2000 19:17:45 +0200
------------------------------------- Linux-Mandrake Security Update ------------------------------------- Package: cdrecord Affected versions: 6.1 7.0 Problem: The linux cdrecord binary is vulnerable to a locally exploitable buffer overflow attack. When installed on a Linux-Mandrake distribution, it is by default setgid "cdburner" (which is a group, gid: 80, that is created for the application). The overflow condition is the result of no bounds checking on the 'dev=' argument passed to cdburner at execution time. This vulnerability can be exploited to execute arbitrary commands with the gid "cdburner". Please upgrade to: md5sum: 8f4544f8307019230e74717a9b836051 package: 7.0/RPMS/cdrecord-1.8.1-4mdk.i586.rpm md5sum: 6daec92096f82bfac45a3346cbdc9cdb package: 7.0/RPMS/cdrecord-cdda2wav-1.8.1-4mdk.i586.rpm md5sum: 7dd8e55e2f2879ed84d7b667a09bc77c package: 7.0/RPMS/cdrecord-devel-1.8.1-4mdk.i586.rpm md5sum: da6240b73b4238ae554dbf45616319ec package: 7.0/RPMS/mkisofs-1.12.1-4mdk.i586.rpm md5sum: 624aebaf07615e3f18471d3ff9af4ede source package: 7.0/SRPMS/cdrecord-1.8.1-4mdk.src.rpm To upgrade automatically, use « MandrakeUpdate ». If you want to upgrade manually, download the updated package from one of our FTP server mirrors and uprade with "rpm -Uvh package_name". All mirrors are listed on http://www.mandrake.com/en/ftp.php3 Updated packages are available in the "updates/" directory. For example, if you are looking for an updated RPM package for Mandrake 7.0, look for it in: updates/7.0/RPMS/ Note: we give the md5 sum for each package. It lets you check the integrity of the downloaded package by running the md5sum command on the package ("md5sum package.rpm"). -- MandrakeSoft Inc http://www.mandrakesoft.com In travel. --Chmouel
Current thread:
- Re: [rootshell.com] Xterm DoS Attack, (continued)
- Re: [rootshell.com] Xterm DoS Attack Soeren Staun-Pedersen (Jun 02)
- Insecure encryption in PassWD v1.2 Daniel Roethlisberger (Jun 03)
- Re: [rootshell.com] Xterm DoS Attack Wakko Ellington Warner-Warner III (Jun 04)
- Linux-Mandrake Xlockmore security update Chmouel Boudjnah (Jun 04)
- Microsoft BackOffice component: adredir.asp Michal Zalewski (Jun 03)
- Re: [rootshell.com] Xterm DoS Attack Darren Reed (Jun 02)
- Re: [rootshell.com] Xterm DoS Attack gavina () CSIS GVSU EDU (Jun 02)
- [Debian] Majordomo will be removed Aleph One (Jun 03)
- /usr/bin/Mail exploit for Slackware 7.0 (mail-slack.c) Paulo Ribeiro (Jun 02)
- Re: /usr/bin/Mail exploit for Slackware 7.0 (mail-slack.c) Christopher Schulte (Jun 04)
- [Gael Duval <gduval () mandrakesoft com>] [Security Announce] cdrecord Chmouel Boudjnah (Jun 03)
- Remote DoS attack in Real Networks Real Server (Strike #2) Vulnerability Ussr Labs (Aug 01)
- Re: Remote DoS attack in Real Networks Real Server (Strike #2)Vulnerability Jeff Long (Jun 02)
- [JOLT2] Remote Denial of Service against Be/OS. visi0n (Jun 01)
- Re: Remote DoS attack in Real Networks Real Server (Strike #2)Vulnerability Jeff Long (Jun 02)
- Re: Remote DoS attack in Real Networks Real Server (Strike #2)Vulnerability Jeff Long (Jun 02)