Debian Security Advisory

traceroute -- local root exploit

Date Reported:
13 Oct 2000
Affected Packages:
traceroute
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2000-0949.
More information:
In versions of the traceroute package before 1.4a5-3, it is possible for a local user to gain root access by exploiting an argument parsing error.

This problem is fixed in version 1.4a5-3, uploaded to Debian's unstable distribution on August 24, 2000. Fixed packages are now also available in proposed-updates and will be included in the next revision of Debian/2.2 (potato).

Debian GNU/Linux 2.1 (slink) contains an earlier version of traceroute, which is not affected by this problem.

The traceroute-nanog package is unaffected by this problem.

Fixed in:

Debian GNU/Linux 2.2 (potato)

Source:
http://security.debian.org/dists/potato/updates/main/source/traceroute_1.4a5-3.diff.gz
http://security.debian.org/dists/potato/updates/main/source/traceroute_1.4a5-3.dsc
http://security.debian.org/dists/potato/updates/main/source/traceroute_1.4a5.orig.tar.gz
Alpha:
http://security.debian.org/dists/potato/updates/main/binary-alpha/traceroute_1.4a5-3_alpha.deb
ARM:
http://security.debian.org/dists/potato/updates/main/binary-arm/traceroute_1.4a5-3_arm.deb
Intel IA-32:
http://security.debian.org/dists/potato/updates/main/binary-i386/traceroute_1.4a5-3_i386.deb
Motorola 680x0:
http://security.debian.org/dists/potato/updates/main/binary-m68k/traceroute_1.4a5-3_m68k.deb
PowerPC:
http://security.debian.org/dists/potato/updates/main/binary-powerpc/traceroute_1.4a5-3_powerpc.deb
Sun SPARC:
http://security.debian.org/dists/potato/updates/main/binary-sparc/traceroute_1.4a5-3_sparc.deb