Bugtraq mailing list archives

Security Update: [CSSA-2002-038.0] Linux: inn format string and insecure open vulnerabilities


From: security () caldera com
Date: Thu, 24 Oct 2002 17:42:26 -0700

To: bugtraq () securityfocus com announce () lists caldera com security-alerts () linuxsecurity com full-disclosure () 
lists netsys com


______________________________________________________________________________

                        SCO Security Advisory

Subject:                Linux: inn format string and insecure open vulnerabilities
Advisory number:        CSSA-2002-038.0
Issue date:             2002 October 24
Cross reference:
______________________________________________________________________________


1. Problem Description

        There are several format string coding bugs as well as unsecure
        open() calls in the inn program.


2. Vulnerable Supported Versions

        System                          Package
        ----------------------------------------------------------------------

        OpenLinux 3.1.1 Server          prior to inn-2.2.3-13.i386.rpm

        OpenLinux 3.1 Server            prior to inn-2.2.3-13.i386.rpm


3. Solution

        The proper solution is to install the latest packages. Many
        customers find it easier to use the Caldera System Updater, called
        cupdate (or kcupdate under the KDE environment), to update these
        packages rather than downloading and installing them by hand.


4. OpenLinux 3.1.1 Server

        4.1 Package Location

        ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-038.0/RPMS

        4.2 Packages

        f707c8840d70ffb02e6377a4f1adb539        inn-2.2.3-13.i386.rpm

        4.3 Installation

        rpm -Fvh inn-2.2.3-13.i386.rpm

        4.4 Source Package Location

        ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-038.0/SRPMS

        4.5 Source Packages

        698bb36510be3d8b9b7215b873c51d81        inn-2.2.3-13.src.rpm


5. OpenLinux 3.1 Server

        5.1 Package Location

        ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-038.0/RPMS

        5.2 Packages

        f1fe7fe3f9c85e6d240b69ec4b193649        inn-2.2.3-13.i386.rpm

        5.3 Installation

        rpm -Fvh inn-2.2.3-13.i386.rpm

        5.4 Source Package Location

        ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-038.0/SRPMS

        5.5 Source Packages

        acbd7f418b5bf1d70ec0d14aadd69d30        inn-2.2.3-13.src.rpm


6. References

        Specific references for this advisory:
                http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0525
                http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0526

        SCO security resources:
                http://www.sco.com/support/security/index.html

        This security fix closes SCO incidents sr863008, fz520651,
        erg712019.


7. Disclaimer

        SCO is not responsible for the misuse of any of the information
        we provide on this website and/or through our security
        advisories. Our advisories are a service to our customers intended
        to promote secure installation and use of SCO products.


8. Acknowledgements

        Paul Starzetz <paul () starzetz de> discovered and researched this
        vulnerability.

______________________________________________________________________________

Attachment: _bin
Description:


Current thread: