[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]
(fwd) Security Update: serious vulnerability in glibc NLS code
[Caldera update for glibc NLS hole. All distributions that I know of
are vulnerable. If you don't see a message for your distribution,
please write your distribution makers to provide you with the update
fast -- Raju]
This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------
Approved-By: aleph1@xxxxxxxxxxxxxxxxx
Delivered-To: bugtraq@xxxxxxxxxxxxxxxxxxxxxxx
Received: from securityfocus.com (mail.securityfocus.com [207.126.127.78]) by
lists.securityfocus.com (Postfix) with SMTP id 9E6231F4B1 for
<bugtraq@xxxxxxxxxxxxxxxxxxxxxxx>; Tue, 5 Sep 2000 08:25:56 -0700
(PDT)
Received: (qmail 17610 invoked by alias); 5 Sep 2000 15:27:18 -0000
Delivered-To: bugtraq@xxxxxxxxxxxxxxxxx
Received: (qmail 17607 invoked from network); 5 Sep 2000 15:27:18 -0000
Received: from phoenix.calderasystems.com (216.250.130.1) by
mail.securityfocus.com with SMTP; 5 Sep 2000 15:27:18 -0000
Received: (qmail 6523 invoked by uid 10212); 5 Sep 2000 15:07:28 -0000
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-Mailer: Mutt 0.95.6us
Message-ID: <20000905090728.A19456@xxxxxxxxxxxxxxxxxxxxxxxxxx>
Reply-To: Technical Support <support@xxxxxxxxxxxxxxxxxxxxxxxxxx>
X-To: announce@xxxxxxxxxxxxxxxxxxxxxxxx, linux-security@xxxxxxxxxx
From: Technical Support <support@xxxxxxxxxxxxxxxxxxxxxxxxxx>
Sender: Bugtraq List <BUGTRAQ@xxxxxxxxxxxxxxxxx>
To: BUGTRAQ@xxxxxxxxxxxxxxxxx
Subject: Security Update: serious vulnerability in glibc NLS code
Date: Tue, 5 Sep 2000 09:07:28 -0600
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: serious vulnerability in glibc NLS code
Advisory number: CSSA-2000-030.0
Issue date: 2000 September, 1
Cross reference:
______________________________________________________________________________
1. Problem Description
The GNU C library, glibc, allows users to specify their so-called
locale through environment variables such as LANG. The locale
determines what language, monetary signs etc to use when
communicating with the user.
A bug in the parsing of these locale names allows an attacker to
trick glibc into using locale information files provided by the
attacker, which can make an application crash.
This bug can be used by local users to obtain root privilege
through various setuid root applications.
2. Vulnerable Versions
System Package
-----------------------------------------------------------
OpenLinux Desktop 2.3 All packages previous to
glibc-2.1.1-3
OpenLinux eServer 2.3 All packages previous to
and OpenLinux eBuilder glibc-2.1.3-4S
OpenLinux eDesktop 2.4 All packages previous to
glibc-2.1.2-7
3. Solution
Workaround:
None known.
4. OpenLinux Desktop 2.3
4.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS
4.2 Verification
9509340276c43bdcbeee2d95e82b9d03 RPMS/glibc-2.1.1-3.i386.rpm
e7d4b0f9db9b92af32b224d7e1b83511 RPMS/glibc-devel-2.1.1-3.i386.rpm
b2fac2bcf6e961d7fc5f4071be2cd934 RPMS/glibc-devel-static-2.1.1-3.i386.rpm
3883f85e36804e8a25f5c8f1d5644a18 RPMS/glibc-localedata-2.1.1-3.i386.rpm
8c155c6564b725d09c9c2b4109212774 SRPMS/glibc-2.1.1-3.src.rpm
4.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fhv glibc-*.i386.rpm
5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0
5.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS
5.2 Verification
083a50ef11461be5925c139ab1754e78 RPMS/glibc-2.1.3-4S.i386.rpm
d47e1eef4448514d3d6163acf6752a33 RPMS/glibc-devel-2.1.3-4S.i386.rpm
c2534552c30464f4d7a5b35a909dd2da RPMS/glibc-devel-static-2.1.3-4S.i386.rpm
87e72a76353c38dd856e48199d03a965 RPMS/glibc-localedata-2.1.3-4S.i386.rpm
24dc7d444ed055987af0fdf86ac43e6e SRPMS/glibc-2.1.3-4S.src.rpm
5.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fhv glibc-*i386.rpm
6. OpenLinux eDesktop 2.4
6.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS
6.2 Verification
d8729cd44a58ee64b1e771bee3cbafb2 RPMS/glibc-2.1.2-7.i386.rpm
e9138f01f763a454598cf5832ef43327 RPMS/glibc-devel-2.1.2-7.i386.rpm
c0a617bf52890fdae7351bcc293540b2 RPMS/glibc-devel-static-2.1.2-7.i386.rpm
704b41eab208e9991f0248ff0c54db54 RPMS/glibc-localedata-2.1.2-7.i386.rpm
29820d97b016f0143528f49eb85ef405 SRPMS/glibc-2.1.2-7.src.rpm
6.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fhv glibc-*i386.rpm
7. References
This and other Caldera security resources are located at:
http://www.calderasystems.com/support/security/index.html
This security fix closes Caldera's internal Problem Report 7602.
8. Disclaimer
Caldera Systems, Inc. is not responsible for the misuse of any of the
information we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended to
promote secure installation and use of Caldera OpenLinux.
9. Acknowledgements
Caldera Systems wishes to thank Jouko Pynnönen <jouko@xxxxxxxxxxxx>
for finding and reporting this problem.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE5r9wV18sy83A/qfwRAvCdAJ9T30jQ8Xz6Jr6TXFes6rzkdsoMnACgqhTp
7j/S/7YSFxYO2X6sCxoqRAc=
=8a0Y
-----END PGP SIGNATURE-----
------------------------------
End of this Digest
******************