GLSA: pam_ldap

From: Daniel Ahlberg (alizat_private)
Date: Wed Oct 30 2002 - 14:33:41 PST

  • Next message: Sebastian Krahmer: "SuSE Security Announcement: syslog-ng (SuSE-SA:2002:039)"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200210-013
    - - --------------------------------------------------------------------
    
    PACKAGE : pam_ldap
    SUMMARY : format string attack
    DATE    : 2002-10-30 22:10 UTC
    EXPLOIT : local
    
    - - --------------------------------------------------------------------
    
    Versions 143 and earlier of the pam_ldap module are vulnerable to a 
    format string attack. A local attacker could supply a malicious 
    format string when opening a configuration file, which could allow 
    the attacker to execute arbitrary code on the system with elevated 
    privileges.
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-libs/pam_ldap-134-r1 and earlier update their systems as follows:
    
    emerge rsync
    emerge pam_ldap
    emerge clean
    
    - - --------------------------------------------------------------------
    alizat_private - GnuPG key is available at www.gentoo.org/~aliz
    - - --------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)
    
    iD8DBQE9wF5EfT7nyhUpoZMRArjCAJsEkwr+rMxtCSwJ4ylCHo126BBlZwCfRE2Y
    /snm/fWy0G8/l4C+85kHfgc=
    =O57d
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Wed Oct 30 2002 - 15:11:16 PST