Debian Security Advisory

DSA-014-2 splitvt -- buffer overflow and format string attack

Date Reported:
23 Jan 2001
Affected Packages:
splitvt
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 2210.
In Mitre's CVE dictionary: CVE-2001-0111, CVE-2001-0112.
More information:
It was reported recently that splitvt is vulnerable to numerous buffer overflow attack and a format string attack. An attacker was able to gain access to the root user id.

We recommend you upgrade your splitvt package immediately.

Fixed in:

Debian 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/splitvt_1.6.5-0potato1.diff.gz
http://security.debian.org/dists/stable/updates/main/source/splitvt_1.6.5-0potato1.dsc
http://security.debian.org/dists/stable/updates/main/source/splitvt_1.6.5.orig.tar.gz
alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/splitvt_1.6.5-0potato1_alpha.deb
arm:
http://security.debian.org/dists/stable/updates/main/binary-arm/splitvt_1.6.5-0potato1_arm.deb
i386:
http://security.debian.org/dists/stable/updates/main/binary-i386/splitvt_1.6.5-0potato1_i386.deb
m68k:
http://security.debian.org/dists/stable/updates/main/binary-m68k/splitvt_1.6.5-0potato1_m68k.deb
powerpc:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/splitvt_1.6.5-0potato1_powerpc.deb
sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/splitvt_1.6.5-0potato1_sparc.deb