Gentoo Archives: gentoo-announce

From: aliz@gentoo.org (Daniel Ahlberg)
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com
Subject: [gentoo-announce] GLSA: pam_smb (200309-01)
Date: Mon, 01 Sep 2003 12:03:47
Message-Id: 20030901121256.0D1429FBB0@noc.internal.fairytale.se
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - ---------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200309-01
6 - - - ---------------------------------------------------------------------
7
8           PACKAGE : pam_smb
9           SUMMARY : buffer overflow
10              DATE : 2003-09-01 12:12 UTC
11           EXPLOIT : remote
12 VERSIONS AFFECTED : <pam_smb-2.0.0_rc5
13     FIXED VERSION : >=pam_smb-2.0.0_rc5
14               CVE : CAN-2003-0686
15
16 - - - ---------------------------------------------------------------------
17
18 quote from Debian DSA-374-1:
19
20 "If a long password is supplied, this can cause a buffer overflow which
21 could be exploited to execute arbitrary code with the privileges of the
22 process which invokes PAM services."
23
24 SOLUTION
25
26 It is recommended that all Gentoo Linux users who are running
27 net-misc/pam_smb upgrade to pam_smb-2.0.0_rc5 as follows
28
29 emerge sync
30 emerge pam_smb
31 emerge clean
32
33 - - - ---------------------------------------------------------------------
34 aliz@g.o - GnuPG key is available at http://dev.gentoo.org/~aliz
35 - - - ---------------------------------------------------------------------
36 -----BEGIN PGP SIGNATURE-----
37 Version: GnuPG v1.2.3 (GNU/Linux)
38
39 iD8DBQE/UzfHfT7nyhUpoZMRAn0+AJ9G7Fz+C24SgDhG+7ttu9uaMVSdjwCeOXvJ
40 1essxpePeyawnfuixgUkaeg=
41 =nlva
42 -----END PGP SIGNATURE-----