1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - -------------------------------------------------------------------- |
5 |
GENTOO LINUX SECURITY ANNOUNCEMENT |
6 |
- - -------------------------------------------------------------------- |
7 |
|
8 |
PACKAGE :openafs |
9 |
SUMMARY :remote root |
10 |
DATE :2002-08-03 23:26 UTC |
11 |
|
12 |
- - -------------------------------------------------------------------- |
13 |
|
14 |
OVERVIEW |
15 |
|
16 |
A remote user may be able to gain root access to an OpenAFS database |
17 |
server or fileserver host. In addition, certain administrative clients |
18 |
may be attacked if they make requests to a rogue server. |
19 |
|
20 |
DETAIL |
21 |
|
22 |
There is an integer overflow bug in the SUNRPC-derived RPC library |
23 |
used by OpenAFS that could be exploited to crash certain OpenAFS |
24 |
servers (volserver, vlserver, ptserver, buserver) or to obtain |
25 |
unauthorized root access to a host running one of these processes. |
26 |
|
27 |
In addition, it is possible for a rogue server to attack certain |
28 |
administrative clients (vos, pts, backup, butc, rxstat), but only |
29 |
if certain RPC requests are made to the rogue server. |
30 |
|
31 |
The OpenAFS fileserver and cache manager (client) are not vulnerable |
32 |
to these attacks. No exploits are presently known to be available |
33 |
for this vulnerability. |
34 |
|
35 |
The full advisory may be found here: |
36 |
http://www.openafs.org/pages/security/OPENAFS-SA-2002-001.txt |
37 |
|
38 |
SOLUTION |
39 |
|
40 |
This security issue was fixed in ebuild version 1.2.5-r1 uploaded to |
41 |
portage on Fri Aug 2 22:47:20 2002 UTC. The OpenAFS team has released |
42 |
OpenAFS 1.2.6 to fix this security issue. |
43 |
|
44 |
It is recommended that all Gentoo Linux users who has OpenAFS installed |
45 |
update their systems as follows. |
46 |
|
47 |
emerge rsync |
48 |
emerge openafs |
49 |
emerge clean |
50 |
|
51 |
- - -------------------------------------------------------------------- |
52 |
Daniel Ahlberg |
53 |
aliz@g.o |
54 |
- - -------------------------------------------------------------------- |
55 |
-----BEGIN PGP SIGNATURE----- |
56 |
Version: GnuPG v1.0.7 (GNU/Linux) |
57 |
|
58 |
iD8DBQE9TGmlfT7nyhUpoZMRAsL3AKC+ZvjuRFBXxSDCvwzeFtRjihclawCghcwF |
59 |
EppTLAfmlWfN5P5pcBVDedk= |
60 |
=dEvV |
61 |
-----END PGP SIGNATURE----- |