* GLSA: setiathome (200304-03)
@ 2003-04-09 10:58 Daniel Ahlberg
0 siblings, 0 replies; only message in thread
From: Daniel Ahlberg @ 2003-04-09 10:58 UTC (permalink / raw
To: gentoo-announce
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200304-03
- - ---------------------------------------------------------------------
PACKAGE : setiathome
SUMMARY : buffer overflow
DATE : 2003-04-09 10:57 UTC
EXPLOIT : remote
VERSIONS AFFECTED : <3.08
FIXED VERSION : >=3.08
CVE :
- - ---------------------------------------------------------------------
- From advisory:
"There is a bufferoverflow in the server responds handler. Sending an
overly large string followed by a newline ('\n') character to the
client will trigger this overflow. This has been tested with various
versions of the client. All versions are presumed to have this flaw in
some form."
Read the full advisory at:
http://spoor12.edup.tudelft.nl/
SOLUTION
It is recommended that all Gentoo Linux users who are running
app-sci/setiathome upgrade to setiathome-3.08 as follows:
emerge sync
emerge setiathome
emerge clean
- - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz
- - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQE+k/y4fT7nyhUpoZMRAgi7AJ4hG59plYUfRAafSKbRmeI++rT5ZACgs+Vk
6Pqp0YFy+4mqb7Am7f4h/PQ=
=IlMz
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2003-04-09 15:30 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-04-09 10:58 GLSA: setiathome (200304-03) Daniel Ahlberg
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox