GLSA: openldap

From: Daniel Ahlberg (alizat_private)
Date: Fri Dec 27 2002 - 16:10:13 PST

  • Next message: Casper Aleva: "Potential DOS attack with Web-CyrAdm."

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200212-12
    - - --------------------------------------------------------------------
    
    PACKAGE : openldap
    SUMMARY : remote command execution
    DATE    : 2002-12-28 00:12 UTC
    EXPLOIT : remote
    
    - - --------------------------------------------------------------------
    
    - From SuSE Security Advisory SuSE-SA:2002:047:
    
    "The SuSE Security Team reviewed critical parts of that package and 
    found several buffer overflows and other bugs remote attackers could 
    exploit to gain access on systems running vulnerable LDAP servers.
    In addition to these bugs, various local exploitable bugs within the
    OpenLDAP2 libraries (openldap2-devel package) have been fixed."
    
    Read the full advisory at
    http://www.suse.de/de/security/2002_047_openldap2.html
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-nds/openldap-2.0.25-r2 update their systems as follows:
    
    emerge rsync
    emerge openldap
    emerge clean
    
    - - --------------------------------------------------------------------
    alizat_private - GnuPG key is available at www.gentoo.org/~aliz
    rakerat_private
    - - --------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.1 (GNU/Linux)
    
    iD8DBQE+DOvXfT7nyhUpoZMRAosUAJwLfUla5RD/VxF7WHAm8ZAbbFYgmACgugyg
    WemCvhFKS9lr6lCJpOS3Nyo=
    =Oga0
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Mon Dec 30 2002 - 08:04:27 PST