Gentoo Archives: gentoo-dev

From: M0rpheus <m0rpheus@×××××××××××××.nu>
To: gentoo-user@g.o, gentoo-dev@g.o
Subject: [gentoo-dev] [SECURITY] [GENTOO] New stunnel version to fix format string bugs [REVISED]
Date: Thu, 17 Jan 2002 14:30:01
Message-Id: 3C47432C.1000100@poseidon.mine.nu
1 - --------------------------------------------------------------------------
2 GENTOO LINUX SECURITY ANNOUNCEMENT
3 - --------------------------------------------------------------------------
4
5 PACKAGE :stunnel
6 SUMMARY :vulnerable to format string bugs
7 DATE :2002-01-17 20:32:00
8
9 - --------------------------------------------------------------------------
10
11 OVERVIEW
12
13
14 All versions of stunnel from 3.15 to 3.21c are vulnerable to format
15 string bugs in the functions which implement smtp, pop, and nntp client
16 negotiations. Using stunnel with the "-n service" option and the "-c"
17 client mode option, a malicious server could use the format sting
18 vulnerability to run arbitrary code as the owner of the current stunnel
19 process. Version 3.22 is not vulnerable to this bug.
20
21
22
23 DETAIL
24
25 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0002
26 http://marc.theaimsgroup.com/?l=stunnel-users&m=100868569203440
27 http://marc.theaimsgroup.com/?l=stunnel-users&m=100913948312986
28
29
30
31
32 SOLUTION
33
34 It is recommended that all stunnel users apply the update
35
36 Portage Auto:
37
38 emerge rsync
39 emerge update
40 emerge update --world
41
42
43 Portage by hand:
44
45 emerge rsync
46 emerge net-misc/stunnel
47
48 Manually:
49
50 Download the new stunnel package here and follow in file instructions:
51 http://www.stunnel.org/download/stunnel/src/stunnel-3.22.tar.gz
52
53 - --------------------------------------------------------------------------
54 Ferry Meyndert
55 m0rpheus@×××××××××××××.nu
56 - --------------------------------------------------------------------------
57
58 Thnx Joa who found the stupid error :))