Debian Security Advisory
traceroute -- local root exploit
- Date Reported:
- 13 Oct 2000
- Affected Packages:
- traceroute
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2000-0949.
- More information:
-
In versions of the traceroute package before 1.4a5-3, it is possible for a
local user to gain root access by exploiting an argument parsing error.
This problem is fixed in version 1.4a5-3, uploaded to Debian's unstable distribution on August 24, 2000. Fixed packages are now also available in proposed-updates and will be included in the next revision of Debian/2.2 (potato).
Debian GNU/Linux 2.1 (slink) contains an earlier version of traceroute, which is not affected by this problem.
The traceroute-nanog package is unaffected by this problem.
- Fixed in:
-
Debian GNU/Linux 2.2 (potato)
- Source:
- http://security.debian.org/dists/potato/updates/main/source/traceroute_1.4a5-3.diff.gz
- http://security.debian.org/dists/potato/updates/main/source/traceroute_1.4a5-3.dsc
- http://security.debian.org/dists/potato/updates/main/source/traceroute_1.4a5.orig.tar.gz
- http://security.debian.org/dists/potato/updates/main/source/traceroute_1.4a5-3.dsc
- Alpha:
- http://security.debian.org/dists/potato/updates/main/binary-alpha/traceroute_1.4a5-3_alpha.deb
- ARM:
- http://security.debian.org/dists/potato/updates/main/binary-arm/traceroute_1.4a5-3_arm.deb
- Intel IA-32:
- http://security.debian.org/dists/potato/updates/main/binary-i386/traceroute_1.4a5-3_i386.deb
- Motorola 680x0:
- http://security.debian.org/dists/potato/updates/main/binary-m68k/traceroute_1.4a5-3_m68k.deb
- PowerPC:
- http://security.debian.org/dists/potato/updates/main/binary-powerpc/traceroute_1.4a5-3_powerpc.deb
- Sun SPARC:
- http://security.debian.org/dists/potato/updates/main/binary-sparc/traceroute_1.4a5-3_sparc.deb