Debian Security Advisory
DSA-014-2 splitvt -- buffer overflow and format string attack
- Date Reported:
- 23 Jan 2001
- Affected Packages:
- splitvt
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 2210.
In Mitre's CVE dictionary: CVE-2001-0111, CVE-2001-0112. - More information:
- It was reported recently that splitvt is vulnerable to
numerous buffer overflow attack and a format string attack. An attacker was
able to gain access to the root user id.
We recommend you upgrade your splitvt package immediately.
- Fixed in:
-
Debian 2.2 (potato)
- Source:
-
http://security.debian.org/dists/stable/updates/main/source/splitvt_1.6.5-0potato1.diff.gz
-
http://security.debian.org/dists/stable/updates/main/source/splitvt_1.6.5-0potato1.dsc
-
http://security.debian.org/dists/stable/updates/main/source/splitvt_1.6.5.orig.tar.gz
- alpha:
-
http://security.debian.org/dists/stable/updates/main/binary-alpha/splitvt_1.6.5-0potato1_alpha.deb
- arm:
-
http://security.debian.org/dists/stable/updates/main/binary-arm/splitvt_1.6.5-0potato1_arm.deb
- i386:
-
http://security.debian.org/dists/stable/updates/main/binary-i386/splitvt_1.6.5-0potato1_i386.deb
- m68k:
-
http://security.debian.org/dists/stable/updates/main/binary-m68k/splitvt_1.6.5-0potato1_m68k.deb
- powerpc:
-
http://security.debian.org/dists/stable/updates/main/binary-powerpc/splitvt_1.6.5-0potato1_powerpc.deb
- sparc:
-
http://security.debian.org/dists/stable/updates/main/binary-sparc/splitvt_1.6.5-0potato1_sparc.deb