drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in tripwire
Name: |
Pufferüberlauf in tripwire |
|
ID: |
MDKSA-2004:057-1 |
|
Distribution: |
Mandrake |
|
Plattformen: |
Mandrake 9.2 |
|
Datum: |
Mi, 7. Juli 2004, 13:00 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0536
http://www.securityfocus.com/archive/1/365036 |
|
Applikationen: |
Tripwire |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
_______________________________________________________________________
Mandrakelinux Security Update Advisory _______________________________________________________________________
Package name: tripwire Advisory ID: MDKSA-2004:057-1 Date: July 6th, 2004 Original Advisory Date: June 7th, 2004 Affected versions: 9.2 ______________________________________________________________________
Problem Description:
Paul Herman discovered a format string vulnerability in tripwire that could allow a local user to execute arbitrary code with the rights of the user running tripwire (typically root). This vulnerability only exists when tripwire is generating an email report. Update:
The packages previously released for Mandrakelinux 9.2 would segfault when doing a check due to compilation problems. The updated packages correct the problem. _______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0536 http://www.securityfocus.com/archive/1/365036 ______________________________________________________________________
Updated Packages: Mandrakelinux 9.2: 41dc4b726c3538ce29ff43cc21dce2d7 9.2/RPMS/tripwire-2.3.1.2-7.2.92mdk.i586.rpm 5e57f7157f206ff20a8a1d425734c84e 9.2/SRPMS/tripwire-2.3.1.2-7.2.92mdk.src.rpm _______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQFA63sUmqjQ0CJFipgRArbfAKC5vXGZ+Vq4mUaZ+63ke7ygld9VgACcD2tb TtFV21zlp2coUjit5rwzyCs= =tp6A -----END PGP SIGNATURE-----
____________________________________________________ Want to buy your Pack or Services from MandrakeSoft? Go to http://www.mandrakestore.com Join the Club : http://www.mandrakeclub.com ____________________________________________________
|
|
|
|