[Full-Disclosure] GLSA: pam_smb (200309-01)

From: Daniel Ahlberg (alizat_private)
Date: Mon Sep 01 2003 - 05:33:09 PDT

  • Next message: Daniel Ahlberg: "[Full-Disclosure] GLSA: pam_smb (200309-01)"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - - ---------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200309-01
    - - - ---------------------------------------------------------------------
    
              PACKAGE : pam_smb
              SUMMARY : buffer overflow
                 DATE : 2003-09-01 12:33 UTC
              EXPLOIT : remote
    VERSIONS AFFECTED : <pam_smb-2.0.0_rc5
        FIXED VERSION : >=pam_smb-2.0.0_rc5
                  CVE : CAN-2003-0686
    
    - - - ---------------------------------------------------------------------
    
    quote from Debian DSA-374-1:
    
    "If a long password is supplied, this can cause a buffer overflow which 
    could be exploited to execute arbitrary code with the privileges of the 
    process which invokes PAM services."
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-misc/pam_smb upgrade to pam_smb-2.0.0_rc5 as follows
    
    emerge sync
    emerge pam_smb
    emerge clean
    
    - - - ---------------------------------------------------------------------
    alizat_private - GnuPG key is available at http://dev.gentoo.org/~aliz
    - - - ---------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.3 (GNU/Linux)
    
    iD8DBQE/UzyFfT7nyhUpoZMRAi4QAKCE9s6K1SUUKx9SQCFPv9xWG+x5RQCgmAAr
    +nOFtI9LzJrAuJt2vWXVI94=
    =j95c
    -----END PGP SIGNATURE-----
    
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    



    This archive was generated by hypermail 2b30 : Mon Sep 01 2003 - 06:00:50 PDT