Family: Debian Local Security Checks --> Category: infos
[DSA282] DSA-282-1 glibc Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
eEye Digital Security discovered an integer overflow in the
xdrmem_getbytes() function which is also present in GNU libc. This
function is part of the XDR (external data representation)
encoder/decoder derived from Sun's RPC implementation. Depending upon
the application, this vulnerability can cause buffer overflows and
could possibly be exploited to execute arbitrary code.
For the stable distribution (woody) this problem has been
fixed in version 2.2.5-11.5.
For the old stable distribution (potato) this problem has been
fixed in version 2.1.3-25.
For the unstable distribution (sid) this problem has been
fixed in version 2.3.1-16.
We recommend that you upgrade your libc6 packages.
Solution : http://www.debian.org/security/2003/dsa-282
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.