Family: Debian Local Security Checks --> Category: infos
[DSA461] DSA-461-1 calife Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Leon Juranic discovered a buffer overflow related to the
getpass(3) library function in
calife, a program which provides super user rights to specific
users. A local attacker could potentially
exploit this vulnerability, given knowledge of a local user's password
and the existence of at least one entry in /etc/calife.auth, to execute
arbitrary code with root rights.
For the current stable distribution (woody) this problem has been
fixed in version 2.8.4c-1woody1.
For the unstable distribution (sid) this problem has been fixed in
We recommend that you update your calife package.
Solution : http://www.debian.org/security/2004/dsa-461
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.