1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - -------------------------------------------------------------------- |
5 |
GENTOO LINUX SECURITY ANNOUNCEMENT |
6 |
- - -------------------------------------------------------------------- |
7 |
|
8 |
PACKAGE :glibc |
9 |
SUMMARY :integer overflow |
10 |
DATE :2002-09-05 11:00 UTC |
11 |
|
12 |
- - -------------------------------------------------------------------- |
13 |
|
14 |
OVERVIEW |
15 |
|
16 |
There is an integer overflow present in the xdr_array() function distributed |
17 |
as part of the Sun Microsystems XDR library. This overflow has been shown to |
18 |
lead to remotely exploitable buffer overflows in multiple applications, |
19 |
leading to the execution of arbitrary code. Although the library was |
20 |
originally distributed by Sun Microsystems, multiple vendors have included |
21 |
the vulnerable code in their own implementations. |
22 |
|
23 |
DETAIL |
24 |
|
25 |
The XDR (external data representation) libraries are used to provide |
26 |
platform-independent methods for sending data from one system process to |
27 |
another, typically over a network connection. Such routines are commonly used |
28 |
in remote procedure call (RPC) implementations to provide transparency to |
29 |
application programmers who need to use common interfaces to interact with |
30 |
many different types of systems. The xdr_array() function in the XDR library |
31 |
provided by Sun Microsystems contains an integer overflow that can lead to |
32 |
improperly sized dynamic memory allocation. Subsequent problems like buffer |
33 |
overflows may result, depending on how and where the vulnerable xdr_array() |
34 |
function is used. |
35 |
|
36 |
More information can be found at: |
37 |
|
38 |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0391 |
39 |
http://www.kb.cert.org/vuls/id/192995 |
40 |
|
41 |
SOLUTION |
42 |
|
43 |
It is recommended that all Gentoo Linux users who are running |
44 |
sys-libc/glibc-2.2.5-r5 and earlier update their systems |
45 |
as follows: |
46 |
|
47 |
emerge rsync |
48 |
emerge glibc |
49 |
emerge clean |
50 |
|
51 |
- - -------------------------------------------------------------------- |
52 |
aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz |
53 |
- - -------------------------------------------------------------------- |
54 |
-----BEGIN PGP SIGNATURE----- |
55 |
Version: GnuPG v1.0.7 (GNU/Linux) |
56 |
|
57 |
iD8DBQE9fJD6fT7nyhUpoZMRAo/0AJ4zq8XvsVkQJ0+KdXF9XAzUsssFlgCguqcY |
58 |
MZ9lI93MlKPnR7HxKC9q/jY= |
59 |
=IsFD |
60 |
-----END PGP SIGNATURE----- |