Debians sikkerhedsbulletin

DSA-082-1 xvt -- bufferoverløb

Rapporteret den:
18. okt 2001
Berørte pakker:
xvt
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Bugtraq-databasen (hos SecurityFocus): BugTraq-id 2964.
I Mitres CVE-ordbog: CVE-2001-1561.
Yderligere oplysninger:
Christophe Bailleux rapporterede på bugtraq at Xvt er sårbar overfor et bufferoverløb i dets håndtering af parametre. Da Xvt installeres som "setuid root", var det muligt for en almindelig bruger at starte Xvt med nøje fremstillede parametre, således at Xvt kørte en root-shell.

Vedligeholderen har rettet problemet i version 2.1-13 aff Xvt i Debian-unstable og 2.1-13.0potato.1 den stabile Debian GNU/Linux 2.2.

Vi anbefaler at du omgående opgraderer din xvt-pakke.

Rettet i:

Debian GNU/Linux 2.2 (potato)

Kildekode:
http://security.debian.org/dists/stable/updates/main/source/xvt_2.1-13.0potato.1.diff.gz
http://security.debian.org/dists/stable/updates/main/source/xvt_2.1-13.0potato.1.dsc
http://security.debian.org/dists/stable/updates/main/source/xvt_2.1.orig.tar.gz
Alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/xvt_2.1-13.0potato.1_alpha.deb
ARM:
http://security.debian.org/dists/stable/updates/main/binary-arm/xvt_2.1-13.0potato.1_arm.deb
Intel ia32:
http://security.debian.org/dists/stable/updates/main/binary-i386/xvt_2.1-13.0potato.1_i386.deb
Motorola 680x0:
http://security.debian.org/dists/stable/updates/main/binary-m68k/xvt_2.1-13.0potato.1_m68k.deb
PowerPC:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xvt_2.1-13.0potato.1_powerpc.deb
Sun Sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/xvt_2.1-13.0potato.1_sparc.deb

MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.