Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Subject: [Gael Duval
From: Chmouel Boudjnah (chmouelMANDRAKESOFT.COM)
Date: Sat Jun 03 2000 - 12:17:45 CDT
- Next message: Paulo Ribeiro: "/usr/bin/Mail exploit for Slackware 7.0 (mail-slack.c)"
- Previous message: Walt: "Re: [rootshell.com] Xterm DoS Attack"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Linux-Mandrake Security Update
Affected versions: 6.1 7.0
Problem: The linux cdrecord binary is vulnerable to a locally
exploitable buffer overflow attack. When installed on a Linux-Mandrake
distribution, it is by default setgid "cdburner" (which is a group,
gid: 80, that is created for the application). The overflow condition
is the result of no bounds checking on the 'dev=' argument passed to
cdburner at execution time. This vulnerability can be exploited to
execute arbitrary commands with the gid "cdburner".
Please upgrade to:
source package: 7.0/SRPMS/cdrecord-1.8.1-4mdk.src.rpm
To upgrade automatically, use « MandrakeUpdate ». If you want to
upgrade manually, download the updated package from one of our FTP
server mirrors and uprade with "rpm -Uvh package_name". All mirrors
are listed on http://www.mandrake.com/en/ftp.php3 Updated packages are
available in the "updates/" directory.
For example, if you are looking for an updated RPM package for
Mandrake 7.0, look for it in: updates/7.0/RPMS/
Note: we give the md5 sum for each package. It lets you check the
integrity of the downloaded package by running the md5sum command on
the package ("md5sum package.rpm").
-- MandrakeSoft Inc http://www.mandrakesoft.com In travel. --Chmouel