Full Disclosure mailing list archives
GLSA: pam_ldap
From: Daniel Ahlberg <aliz () gentoo org>
Date: Wed, 30 Oct 2002 23:33:41 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200210-013 - - -------------------------------------------------------------------- PACKAGE : pam_ldap SUMMARY : format string attack DATE : 2002-10-30 22:10 UTC EXPLOIT : local - - -------------------------------------------------------------------- Versions 143 and earlier of the pam_ldap module are vulnerable to a format string attack. A local attacker could supply a malicious format string when opening a configuration file, which could allow the attacker to execute arbitrary code on the system with elevated privileges. SOLUTION It is recommended that all Gentoo Linux users who are running net-libs/pam_ldap-134-r1 and earlier update their systems as follows: emerge rsync emerge pam_ldap emerge clean - - -------------------------------------------------------------------- aliz () gentoo org - GnuPG key is available at www.gentoo.org/~aliz - - -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE9wF5EfT7nyhUpoZMRArjCAJsEkwr+rMxtCSwJ4ylCHo126BBlZwCfRE2Y /snm/fWy0G8/l4C+85kHfgc= =O57d -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- GLSA: pam_ldap Daniel Ahlberg (Oct 30)