Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: GLSA: setiathome (200304-03)
Date: Wed, 09 Apr 2003 15:30:53
Message-Id: 20030409105802.38DD0339CA@mail1.tamperd.net
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - ---------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200304-03
6 - - ---------------------------------------------------------------------
7
8 PACKAGE : setiathome
9 SUMMARY : buffer overflow
10 DATE : 2003-04-09 10:57 UTC
11 EXPLOIT : remote
12 VERSIONS AFFECTED : <3.08
13 FIXED VERSION : >=3.08
14 CVE :
15
16 - - ---------------------------------------------------------------------
17
18 - From advisory:
19
20 "There is a bufferoverflow in the server responds handler. Sending an
21 overly large string followed by a newline ('\n') character to the
22 client will trigger this overflow. This has been tested with various
23 versions of the client. All versions are presumed to have this flaw in
24 some form."
25
26 Read the full advisory at:
27 http://spoor12.edup.tudelft.nl/
28
29 SOLUTION
30
31 It is recommended that all Gentoo Linux users who are running
32 app-sci/setiathome upgrade to setiathome-3.08 as follows:
33
34 emerge sync
35 emerge setiathome
36 emerge clean
37
38 - - ---------------------------------------------------------------------
39 aliz@g.o - GnuPG key is available at http://cvs.gentoo.org/~aliz
40 - - ---------------------------------------------------------------------
41 -----BEGIN PGP SIGNATURE-----
42 Version: GnuPG v1.2.1 (GNU/Linux)
43
44 iD8DBQE+k/y4fT7nyhUpoZMRAgi7AJ4hG59plYUfRAafSKbRmeI++rT5ZACgs+Vk
45 6Pqp0YFy+4mqb7Am7f4h/PQ=
46 =IlMz
47 -----END PGP SIGNATURE-----