Debian Security Advisory
DSA-124-1 mtr -- buffer overflow
- Date Reported:
- 26 Mar 2002
- Affected Packages:
- mtr
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 4217.
In Mitre's CVE dictionary: CVE-2002-0497. - More information:
-
The authors of mtr released a new upstream version, noting a non-exploitable buffer overflow in their ChangeLog. Przemyslaw Frasunek, however, found an easy way to exploit this bug, which allows an attacker to gain access to the raw socket, which makes IP spoofing and other malicious network activity possible.
The problem has been fixed by the Debian maintainer in version 0.41-6 for the stable distribution of Debian by backporting the upstream fix and in version 0.48-1 for the testing/unstable distribution.
We recommend that you upgrade your mtr package immediately.
- Fixed in:
-
Debian GNU/Linux 2.2 (potato)
- Source:
- http://security.debian.org/dists/stable/updates/main/source/mtr_0.41.orig.tar.gz
- http://security.debian.org/dists/stable/updates/main/source/mtr_0.41-6.dsc
- http://security.debian.org/dists/stable/updates/main/source/mtr_0.41-6.diff.gz
- http://security.debian.org/dists/stable/updates/main/source/mtr_0.41-6.dsc
- Alpha:
- http://security.debian.org/dists/stable/updates/main/binary-alpha/mtr_0.41-6_alpha.deb
- ARM:
- http://security.debian.org/dists/stable/updates/main/binary-arm/mtr_0.41-6_arm.deb
- Intel ia32:
- http://security.debian.org/dists/stable/updates/main/binary-i386/mtr_0.41-6_i386.deb
- Motorola 680x0:
- http://security.debian.org/dists/stable/updates/main/binary-m68k/mtr_0.41-6_m68k.deb
- PowerPC:
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/mtr_0.41-6_powerpc.deb
- Sun Sparc:
- http://security.debian.org/dists/stable/updates/main/binary-sparc/mtr_0.41-6_sparc.deb
MD5 checksums of the listed files are available in the original advisory.