[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20021024174226.B23090@caldera.com>
From: security at caldera.com (security@...dera.com)
Subject: Security Update: [CSSA-2002-038.0] Linux: inn format string and insecure open vulnerabilities
To: bugtraq@...urityfocus.com announce@...ts.caldera.com security-alerts@...uxsecurity.com full-disclosure@...ts.netsys.com
______________________________________________________________________________
SCO Security Advisory
Subject: Linux: inn format string and insecure open vulnerabilities
Advisory number: CSSA-2002-038.0
Issue date: 2002 October 24
Cross reference:
______________________________________________________________________________
1. Problem Description
There are several format string coding bugs as well as unsecure
open() calls in the inn program.
2. Vulnerable Supported Versions
System Package
----------------------------------------------------------------------
OpenLinux 3.1.1 Server prior to inn-2.2.3-13.i386.rpm
OpenLinux 3.1 Server prior to inn-2.2.3-13.i386.rpm
3. Solution
The proper solution is to install the latest packages. Many
customers find it easier to use the Caldera System Updater, called
cupdate (or kcupdate under the KDE environment), to update these
packages rather than downloading and installing them by hand.
4. OpenLinux 3.1.1 Server
4.1 Package Location
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-038.0/RPMS
4.2 Packages
f707c8840d70ffb02e6377a4f1adb539 inn-2.2.3-13.i386.rpm
4.3 Installation
rpm -Fvh inn-2.2.3-13.i386.rpm
4.4 Source Package Location
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-038.0/SRPMS
4.5 Source Packages
698bb36510be3d8b9b7215b873c51d81 inn-2.2.3-13.src.rpm
5. OpenLinux 3.1 Server
5.1 Package Location
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-038.0/RPMS
5.2 Packages
f1fe7fe3f9c85e6d240b69ec4b193649 inn-2.2.3-13.i386.rpm
5.3 Installation
rpm -Fvh inn-2.2.3-13.i386.rpm
5.4 Source Package Location
ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-038.0/SRPMS
5.5 Source Packages
acbd7f418b5bf1d70ec0d14aadd69d30 inn-2.2.3-13.src.rpm
6. References
Specific references for this advisory:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0525
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0526
SCO security resources:
http://www.sco.com/support/security/index.html
This security fix closes SCO incidents sr863008, fz520651,
erg712019.
7. Disclaimer
SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended
to promote secure installation and use of SCO products.
8. Acknowledgements
Paul Starzetz <paul@...rzetz.de> discovered and researched this
vulnerability.
______________________________________________________________________________
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 237 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20021024/2789fb1d/attachment.bin
Powered by blists - more mailing lists