Debian Security Advisory
DSA-112-1 hanterm -- buffer overflow
- Date Reported:
- 16 Feb 2002
- Affected Packages:
- hanterm
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2002-0239.
- More information:
-
A set of buffer overflow problems have been found in hanterm, a Hangul terminal for X11 derived from xterm, that will read and display Korean characters in its terminal window. The font handling code in hanterm uses hard limited string variables but didn't check for boundaries.
This problem can be exploited by a malicious user to gain access to the utmp group which is able to write the wtmp and utmp files. These files record login and logout activities.
This problem has been fixed in version 3.3.1p17-5.2 for the stable Debian distribution. A fixed package for the current testing/unstable distribution is not yet available but will have a version number higher than 3.3.1p18-6.1.
We recommend that you upgrade your hanterm packages immediately if you have them installed. Known exploits are already available.
- Fixed in:
-
Debian GNU/Linux 2.2 (potato)
- Source:
- http://security.debian.org/dists/stable/updates/main/source/hanterm_3.3.1p17-5.2.diff.gz
- http://security.debian.org/dists/stable/updates/main/source/hanterm_3.3.1p17-5.2.dsc
- http://security.debian.org/dists/stable/updates/main/source/hanterm_3.3.1p17.orig.tar.gz
- http://security.debian.org/dists/stable/updates/main/source/hanterm_3.3.1p17-5.2.dsc
- Alpha:
- http://security.debian.org/dists/stable/updates/main/binary-alpha/hanterm_3.3.1p17-5.2_alpha.deb
- ARM:
- http://security.debian.org/dists/stable/updates/main/binary-arm/hanterm_3.3.1p17-5.2_arm.deb
- Intel ia32:
- http://security.debian.org/dists/stable/updates/main/binary-i386/hanterm_3.3.1p17-5.2_i386.deb
- Motorola 680x0:
- http://security.debian.org/dists/stable/updates/main/binary-m68k/hanterm_3.3.1p17-5.2_m68k.deb
- PowerPC:
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/hanterm_3.3.1p17-5.2_powerpc.deb
- Sun Sparc:
- http://security.debian.org/dists/stable/updates/main/binary-sparc/hanterm_3.3.1p17-5.2_sparc.deb
MD5 checksums of the listed files are available in the original advisory.