GLSA: exim

From: Daniel Ahlberg (alizat_private)
Date: Mon Dec 16 2002 - 08:33:19 PST

  • Next message: Frog Man: "PHP-Nuke 6.0 : Path Disclosure & Cross Site Scripting"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200212-5
    - - --------------------------------------------------------------------
    
    PACKAGE : exim
    SUMMARY : local root vulnerability
    DATE    : 2002-12-16 16:12 UTC
    EXPLOIT : local
    
    - - --------------------------------------------------------------------
    
    - From advisory:
    
    "This is a format string bug in daemon.c, line 976:
    
    sprintf(CS buff, CS pid_file_path, "");   /* Backward compatibility */
    
    pid_file_path can be changed on the command line.
    This line is in the function daemon_go(), which only
    gets executed when the user is an exim-admin-user."
    
    Read the full advisory at
    http://marc.theaimsgroup.com/?l=bugtraq&m=103903403527788&w=2
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-mail/exim-4.05 and earlier update their systems as follows:
    
    emerge rsync
    emerge exim
    emerge clean
    
    - - --------------------------------------------------------------------
    alizat_private - GnuPG key is available at www.gentoo.org/~aliz
    rakerat_private
    - - --------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.1 (GNU/Linux)
    
    iD8DBQE9/gBNfT7nyhUpoZMRAq43AKCfp65F8XNHS5Td8CE1qQiNqvrT9QCeJUTB
    6MYY1rust/c7RtKpA78PAv4=
    =IZpj
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Wed Dec 18 2002 - 18:04:58 PST