Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] GLSA: glibc
Date: Mon, 09 Sep 2002 07:15:58
Message-Id: 200209091415.56252.aliz@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - --------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT
6 - - --------------------------------------------------------------------
7
8 PACKAGE :glibc
9 SUMMARY :integer overflow
10 DATE :2002-09-05 11:00 UTC
11
12 - - --------------------------------------------------------------------
13
14 OVERVIEW
15
16 There is an integer overflow present in the xdr_array() function distributed
17 as part of the Sun Microsystems XDR library. This overflow has been shown to
18 lead to remotely exploitable buffer overflows in multiple applications,
19 leading to the execution of arbitrary code. Although the library was
20 originally distributed by Sun Microsystems, multiple vendors have included
21 the vulnerable code in their own implementations.
22
23 DETAIL
24
25 The XDR (external data representation) libraries are used to provide
26 platform-independent methods for sending data from one system process to
27 another, typically over a network connection. Such routines are commonly used
28 in remote procedure call (RPC) implementations to provide transparency to
29 application programmers who need to use common interfaces to interact with
30 many different types of systems. The xdr_array() function in the XDR library
31 provided by Sun Microsystems contains an integer overflow that can lead to
32 improperly sized dynamic memory allocation. Subsequent problems like buffer
33 overflows may result, depending on how and where the vulnerable xdr_array()
34 function is used.
35
36 More information can be found at:
37
38 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0391
39 http://www.kb.cert.org/vuls/id/192995
40
41 SOLUTION
42
43 It is recommended that all Gentoo Linux users who are running
44 sys-libc/glibc-2.2.5-r5 and earlier update their systems
45 as follows:
46
47 emerge rsync
48 emerge glibc
49 emerge clean
50
51 - - --------------------------------------------------------------------
52 aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz
53 - - --------------------------------------------------------------------
54 -----BEGIN PGP SIGNATURE-----
55 Version: GnuPG v1.0.7 (GNU/Linux)
56
57 iD8DBQE9fJD6fT7nyhUpoZMRAo/0AJ4zq8XvsVkQJ0+KdXF9XAzUsssFlgCguqcY
58 MZ9lI93MlKPnR7HxKC9q/jY=
59 =IsFD
60 -----END PGP SIGNATURE-----