Debian Security Advisory
DSA-1587-1 mtr -- buffer overflow
- Date Reported:
- 26 May 2008
- Affected Packages:
- mtr
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2008-2357.
- More information:
-
Adam Zabrocki discovered that under certain circumstances mtr, a full screen ncurses and X11 traceroute tool, could be tricked into executing arbitrary code via overly long reverse DNS records.
For the stable distribution (etch), this problem has been fixed in version 0.71-2etch1.
For the unstable distribution (sid), this problem has been fixed in version 0.73-1.
We recommend that you upgrade your mtr package.
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1.diff.gz
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1.dsc
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71.orig.tar.gz
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1.dsc
- Alpha:
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_alpha.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_alpha.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_amd64.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_amd64.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_arm.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_arm.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_arm.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_hppa.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_hppa.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_i386.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_i386.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_ia64.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_ia64.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_ia64.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_mips.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_mips.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_mips.deb
- Little-endian MIPS:
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_mipsel.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_mipsel.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_powerpc.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_powerpc.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_s390.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_s390.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/m/mtr/mtr_0.71-2etch1_sparc.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_sparc.deb
- http://security.debian.org/pool/updates/main/m/mtr/mtr-tiny_0.71-2etch1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.