|
Family: Debian Local Security Checks --> Category: infos
[DSA272] DSA-272-1 dietlibc Vulnerability Scan
Vulnerability Scan Summary DSA-272-1 dietlibc
Detailed Explanation for this Vulnerability Test
eEye Digital Security discovered an integer overflow in the
xdrmem_getbytes() function of glibc, that is also present in dietlibc,
a small libc useful especially for small and embedded systems. This
function is part of the XDR encoder/decoder derived from Sun's RPC
implementation. Depending upon the application, this vulnerability
can cause buffer overflows and could possibly be exploited to execute
arbitrary code.
For the stable distribution (woody) this problem has been
fixed in version 0.12-2.5.
The old stable distribution (potato) does not contain dietlibc
packages.
For the unstable distribution (sid) this problem has been
fixed in version 0.22-2.
We recommend that you upgrade your dietlibc packages.
Solution : http://www.debian.org/security/2003/dsa-272
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|