drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in mpg123
Name: |
Pufferüberlauf in mpg123
|
|
ID: |
200309-17 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Mi, 1. Oktober 2003, 13:00 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
mpg123 |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
-------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200309-17 --------------------------------------------------------------------
PACKAGE : mpg123 SUMMARY : buffer overflow DATE : 2003-09-30 14:32 UTC EXPLOIT : remote GENTOO BUG # : 26787 CVE : CAN-2003-0577
--------------------------------------------------------------------
DESCRIPTION
mpg123 contains a heap based buffer overflow that would allow an remote attacker to execute arbitrary code on the victims machine.
SOLUTION
it is recommended that all Gentoo Linux users who are running media-sound/mpg123 upgrade to a fixed version.
make sure that the version to be installed is either one of 0.59r-r3 (stable) or 0.59s-r1 (masked).
emerge sync emerge mpg123 -p emerge mpg123 emerge clean
-------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at http://dev.gentoo.org/~aliz -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux)
iD8DBQE/eZPkfT7nyhUpoZMRAnwiAJ9PLTpDpa6cMaJekjdbX+b/QhqB0QCfTxhJ aC2esvhlnUN1qSR9dPqjKv4= =ggBo -----END PGP SIGNATURE-----
|
|
|
|