Debians sikkerhedsbulletin

DSA-014-2 splitvt -- buffer-overløb og format-streng-angreb

Rapporteret den:
23. jan 2001
Berørte pakker:
splitvt
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Bugtraq-databasen (hos SecurityFocus): BugTraq-id 2210.
I Mitres CVE-ordbog: CVE-2001-0111, CVE-2001-0112.
Yderligere oplysninger:
Det blev for nylig rapporteret at splitvt er sårbar overfor adskillige buffer-overløbsangreb og et format-streng-angreb. En angriber kunne få adgang til root-brugerid'en.

Vi anbefaler at du omgående opgraderer din splitvt-pakke.

Rettet i:

Debian 2.2 (potato)

Kildekode:
http://security.debian.org/dists/stable/updates/main/source/splitvt_1.6.5-0potato1.diff.gz
http://security.debian.org/dists/stable/updates/main/source/splitvt_1.6.5-0potato1.dsc
http://security.debian.org/dists/stable/updates/main/source/splitvt_1.6.5.orig.tar.gz
alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/splitvt_1.6.5-0potato1_alpha.deb
arm:
http://security.debian.org/dists/stable/updates/main/binary-arm/splitvt_1.6.5-0potato1_arm.deb
i386:
http://security.debian.org/dists/stable/updates/main/binary-i386/splitvt_1.6.5-0potato1_i386.deb
m68k:
http://security.debian.org/dists/stable/updates/main/binary-m68k/splitvt_1.6.5-0potato1_m68k.deb
powerpc:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/splitvt_1.6.5-0potato1_powerpc.deb
sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/splitvt_1.6.5-0potato1_sparc.deb