drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in mikmod
Name: |
Pufferüberlauf in mikmod
|
|
ID: |
200307-01 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Fr, 4. Juli 2003, 13:00 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
Mikmod Sound System |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
-------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200307-01 --------------------------------------------------------------------
PACKAGE : mikmod SUMMARY : buffer overflow DATE : 2003-07-02 21:27 UTC EXPLOIT : local VERSIONS AFFECTED : <mikmod-3.1.6a FIXED VERSION : >=mikmod-3.1.6a CVE : CAN-2003-0427
--------------------------------------------------------------------
quote from cve: "Buffer overflow in mikmod 3.1.6 and earlier allows remote attackers to execute arbitrary code via an archive file that contains a file with a long filename."
SOLUTION
It is recommended that all Gentoo Linux users who are running media-sound/mikmod upgrade to mikmod-3.1.6a as follows
emerge sync emerge mikmod emerge clean
-------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQE/A05OfT7nyhUpoZMRAurSAJ9rTNLMgHoWghhGxpCC4wojbg1lRgCfTSYM xh5/rPllaZxb4JLF77qNaWg= =lFSW -----END PGP SIGNATURE-----
|
|
|
|