Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in gnuserv und xemacs
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in gnuserv und xemacs
ID: TLSA2001018
Distribution: TurboLinux
Plattformen: Keine Angabe
Datum: Do, 24. Mai 2001, 13:00
Referenzen: Keine Angabe
Applikationen: XEmacs

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


____________________________________________________________________________________________
_

Turbolinux Security Announcement

Package: xemacs
Vulnerable Packages: All versions prior to xemacs-21.1.14-1
Date: 05/18/2001 5:00 PDT

Affected Turbolinux platforms: TL Server 6.5

Turbolinux Advisory ID#: TLSA2001018

Reference:
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-019.php3?dis=7.2
____________________________________________________________________________________________
_

A security hole was discovered in the package mentioned above.
Please update the packages in your installation as soon as possible.
____________________________________________________________________________________________
_

1. Problem Summary(From the MandrakeSoft Security Advisory)

There are problems in the gnuserv application. It is possible to
overrun the magic cookie buffer, and prefixes of valid magic cookies
are accepted (i.e. "12" can be used if the cookie is
"12345678").


2. Impact(Also from the MandrakeSoft Security Advisory)

It is possible for an attacker to execute arbitrary code.


3. Solution

Update the packages from our ftp server by using the following procedure:

First, uninstall the previous versions of the xemacs packages by
performing the following commands in the given order:

rpm -e xemacs-sumo-el
rpm -e xemacs-sumo
rpm -e xemacs-extra
rpm -e xemacs-el
rpm -e xemacs

Then, install the updated versions of xemacs using the following command:

rpm -Uvh ftp_path_to_filename

Where ftp_path_to_filename is the following:

ftp://ftp.turbolinux.com/pub/updates/6.0/security/xemacs-21.1.14-1.i386.rpm
xemacs-sumo-20001023-1.noarch.rpm
xemacs-sumo-el-20001023-1.noarch.rpm
ftp://ftp.turbolinux.com/pub/updates/6.0/security/xemacs-el-21.1.14-1.i386.rpm

Finally, upgrade the xemacs-extra package using:

rpm -Uvh --force ftp_path_to_filename

Where ftp_path_to_filename is the following:

xemacs-extra-21.1.14-1.i386.rpm

The source RPMs can be downloaded here:

ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/xemacs-21.1.14-1.src.rpm
ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/xemacs-sumo-20001023-1.src.rpm

**Note: You must rebuild and install the RPM if you choose to download
and install the SRPM. Simply installing the SRPM alone WILL NOT CLOSE
THE SECURITY HOLE.

Please verify the MD5 checksums of the updates before you install:

MD5 sum Package Name
--------------------------------------------------------------------------------------------
-
71bff7e86e689492268f5c35d44e02ef xemacs-21.1.14-1.i386.rpm
b112aa7a78cca5928a96a6bc3aeffd5a xemacs-extra-21.1.14-1.i386.rpm
0e2370e870834d8d220f7ffbd927a0c4 xemacs-sumo-20001023-1.noarch.rpm
c87e9d3acb0742c23ad5c3a721701100 xemacs-sumo-el-20001023-1.noarch.rpm
47f9f8badfcae163d7e5f40df31963b6 xemacs-el-21.1.14-1.i386.rpm
e2efb03026505588622cce2e8ce42287 xemacs-21.1.14-1.src.rpm
5d9e1a5ca5c06b211ff4be2baf9a4ce4 xemacs-sumo-20001023-1.src.rpm
____________________________________________________________________________________________
_

These packages are GPG signed by Turbolinux for security. Our key
is available here:

http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

md5sum name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

____________________________________________________________________________________________
_

You can find more updates on our ftp server:

ftp://ftp.turbolinux.com/pub/updates/6.0/security/

for TL6.x Workstation and Server security updates

Our webpage for security announcements:

http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

security@turbolinux.com
_____________________________________________________________________________________________
_

Subscribe to the Turbolinux Security Mailing lists:

TL-security - A moderated list for discussing security issues
Turbolinux products.

Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

TL-security-announce - An announce-only mailing list for security
updates and alerts. Subscribe at:

http://www.turbolinux.com/mailman/listinfo/tl-security-announce

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: pgpenvelope 2.10.0 - http://pgpenvelope.sourceforge.net/

iD8DBQE7BaXQcpw52/ZatwoRAhP4AJ9R8BavJviTPrLICpJRhs8KFu5/4QCeL4nY
3x0CPAQahaqpSoTNINQLY6I=
=CC62
-----END PGP SIGNATURE-----



_______________________________________________
TL-Security-Announce mailing list
TL-Security-Announce@www.turbolinux.com
http://www.turbolinux.com/mailman/listinfo/tl-security-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung