Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Debian Local Security Checks --> Category: infos

[DSA254] DSA-254-1 traceroute-nanog Vulnerability Scan


Vulnerability Scan Summary
DSA-254-1 traceroute-nanog

Detailed Explanation for this Vulnerability Test

A vulnerability has been discovered in NANOG traceroute, an enhanced
version of the Van Jacobson/BSD traceroute program. A buffer overflow
occurs in the 'get_origin()' function. Due to insufficient bounds
checking performed by the whois parser, it may be possible to corrupt
memory on the system stack. This vulnerability can be exploited by a
remote attacker to gain root rights on a target host. Though,
most probably not in Debian.
The Common Vulnerabilities and Exposures (CVE) project additionally
identified the following vulnerabilities which were already fixed in
the Debian version in stable (woody) and oldstable (potato) and are
mentioned here for completeness (and since other distributions had to
release a separate advisory for them):
Fortunately, the Debian package drops rights quite early after
startup, so those problems are not likely to result in an exploit on a
Debian machine.
For the current stable distribution (woody) the above problem has been
fixed in version 6.1.1-1.2.
For the old stable distribution (potato) the above problem has been
fixed in version 6.0-2.2.
For the unstable distribution (sid) these problems have been fixed in
version 6.3.0-1.
We recommend that you upgrade your traceroute-nanog package.


Solution : http://www.debian.org/security/2003/dsa-254
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.