drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in exim
Name: |
Pufferüberlauf in exim
|
|
ID: |
200212-5 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Di, 17. Dezember 2002, 12:00 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
exim |
|
Originalnachricht |
-------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200212-5 --------------------------------------------------------------------
PACKAGE : exim SUMMARY : local root vulnerability DATE : 2002-12-16 16:12 UTC EXPLOIT : local
--------------------------------------------------------------------
From advisory:
"This is a format string bug in daemon.c, line 976:
sprintf(CS buff, CS pid_file_path, ""); /* Backward compatibility */
pid_file_path can be changed on the command line. This line is in the function daemon_go(), which only gets executed when the user is an exim-admin-user."
Read the full advisory at http://marc.theaimsgroup.com/?l=bugtraq&m=103903403527788&w=2
SOLUTION
It is recommended that all Gentoo Linux users who are running net-mail/exim-4.05 and earlier update their systems as follows:
emerge rsync emerge exim emerge clean
-------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz raker@gentoo.org --------------------------------------------------------------------
-- gentoo-security@gentoo.org mailing list
|
|
|
|