Full Disclosure mailing list archives
GLSA: mgetty (200304-09)
From: Daniel Ahlberg <aliz () gentoo org>
Date: Mon, 28 Apr 2003 12:17:51 +0200
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200304-09 - - - --------------------------------------------------------------------- PACKAGE : mgetty SUMMARY : buffer overflow, insecure spool dir DATE : 2003-04-28 10:17 UTC EXPLOIT : remote VERSIONS AFFECTED : <mgetty-1.1.29 FIXED VERSION : >=mgetty-1.1.29 CVE : CAN-2002-1391 CAN-2002-1392 - - - --------------------------------------------------------------------- * faxspool in mgetty before 1.1.29 uses a world-writable spool directory for outgoing faxes, which allows local users to modify fax transmission privileges. * Buffer overflow in cnd-program for mgetty before 1.1.29 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a Caller ID string with a long CallerName argument. SOLUTION It is recommended that all Gentoo Linux users who are running net-dialup/mgetty upgrade to mgetty-1.1.30 as follows: emerge sync emerge mgetty emerge clean - - - --------------------------------------------------------------------- aliz () gentoo org - GnuPG key is available at http://cvs.gentoo.org/~aliz - - - --------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+rP/MfT7nyhUpoZMRAokdAJ91QAEmv7Nr7Hzgp43J0HCDwQfBwwCgt1zc P5fwqg1Nhom86cg231An8y4= =nFXu -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- GLSA: mgetty (200304-09) Daniel Ahlberg (Apr 28)