Debian: 'libgtop' Remote nobody exploit

    Date08 Jan 2002
    CategoryDebian
    3267
    Posted ByLinuxSecurity Advisories
    libgtop_daemon runs as user nobody both bugs could be usedto gain access as the nobody user to a system running libgtop_daemon.
    
    ------------------------------------------------------------------------
    Debian Security Advisory DSA-098-1                   This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                         Wichert Akkerman
    January  9, 2002
    ------------------------------------------------------------------------
    
    
    Package        : libgtop
    Problem type   : remote nobody exploit
    Debian-specific: no
    
    Two different problems where found in libgtop-daemon:
    
    * The laboratory intexxia found a format string problem in the logging
      code from libgtop_daemon. There were two logging functions which are
      called when authorizing a client which could be exploited by a remote
      user.
    
    * Flavio Veloso found a buffer overflow in the function that authorizes
      clients
    
    Since libgtop_daemon runs as user nobody both bugs could be used
    to gain access as the nobody user to a system running libgtop_daemon.
    
    Both problems have been fixed in version 1.0.6-1.1 and we recommend
    you upgrade your libgtop-daemon package immediately.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    Debian GNU/Linux 2.2 alias potato
    ---------------------------------
    
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
    
      Source archives:
         http://security.debian.org/dists/stable/updates/main/source/libgtop_1.0.6-1.1.diff.gz
          MD5 checksum: 19c9689fb62dd1ab26dcfc0a2580280d
         http://security.debian.org/dists/stable/updates/main/source/libgtop_1.0.6-1.1.dsc
          MD5 checksum: 3441b7110981688ecdb0e6941e5d4fb3
         http://security.debian.org/dists/stable/updates/main/source/libgtop_1.0.6.orig.tar.gz
          MD5 checksum: ad63df637697915b5326494a0ae4a337
    
      Alpha architecture:
         
    http://security.debian.org/dists/stable/updates/main/binary-alpha/libgtop-daemon_1.0.6-1.1_alpha.deb
          MD5 checksum: 43c25fd2d11a6cc5c0f4c3d8f504a607
         
    http://security.debian.org/dists/stable/updates/main/binary-alpha/libgtop-dev_1.0.6-1.1_alpha.deb
          MD5 checksum: 264a9de99851b0e93521882c7bd1f0ed
         
    http://security.debian.org/dists/stable/updates/main/binary-alpha/libgtop1_1.0.6-1.1_alpha.deb
          MD5 checksum: 951612c2774818884adbdfcaedfb6470
    
      ARM architecture:
         
    http://security.debian.org/dists/stable/updates/main/binary-arm/libgtop-daemon_1.0.6-1.1_arm.deb
          MD5 checksum: eb273da007eb9687b0c9bc8891c6d515
         
    http://security.debian.org/dists/stable/updates/main/binary-arm/libgtop-dev_1.0.6-1.1_arm.deb
          MD5 checksum: e1b5a197e408b8d47af8324757449a46
         http://security.debian.org/dists/stable/updates/main/binary-arm/libgtop1_1.0.6-1.1_arm.deb
          MD5 checksum: 2ee33ee2f8d1816a16a078ea95bbfe09
    
      Intel IA-32 architecture:
         
    http://security.debian.org/dists/stable/updates/main/binary-i386/libgtop-daemon_1.0.6-1.1_i386.deb
          MD5 checksum: 169c014d0fff9d24045ed733fb26aacc
         
    http://security.debian.org/dists/stable/updates/main/binary-i386/libgtop-dev_1.0.6-1.1_i386.deb
          MD5 checksum: 9ed2aea64be71cf4c4e5dc6274d9c774
         
    http://security.debian.org/dists/stable/updates/main/binary-i386/libgtop1_1.0.6-1.1_i386.deb
          MD5 checksum: 321badb855ed000452f0180a2e557388
    
      Motorola 680x0 architecture:
         
    http://security.debian.org/dists/stable/updates/main/binary-m68k/libgtop-daemon_1.0.6-1.1_m68k.deb
          MD5 checksum: b8b3aeee96118803d74b37b3a8a5d240
         
    http://security.debian.org/dists/stable/updates/main/binary-m68k/libgtop-dev_1.0.6-1.1_m68k.deb
          MD5 checksum: c530ab0d06eb946ae297748fcc616368
         
    http://security.debian.org/dists/stable/updates/main/binary-m68k/libgtop1_1.0.6-1.1_m68k.deb
          MD5 checksum: befab934a9b20ad578a59e4876cd941b
    
      PowerPC architecture:
         
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/libgtop-daemon_1.0.6-1.1_powerpc.deb
          MD5 checksum: c7a4e133d3c23909d5467f2a96171a35
         
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/libgtop-dev_1.0.6-1.1_powerpc.deb
          MD5 checksum: 433f3d7a8ccdff27b41f60ca6b57d4d8
         
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/libgtop1_1.0.6-1.1_powerpc.deb
          MD5 checksum: c54fb9a3383358c613948785f525e57f
    
      Sun Sparc architecture:
         
    http://security.debian.org/dists/stable/updates/main/binary-sparc/libgtop-daemon_1.0.6-1.1_sparc.deb
          MD5 checksum: 506997561175c2d2428ad40bab64729f
         
    http://security.debian.org/dists/stable/updates/main/binary-sparc/libgtop-dev_1.0.6-1.1_sparc.deb
          MD5 checksum: d9609e50f4feb156621e5970a93d81a8
         
    http://security.debian.org/dists/stable/updates/main/binary-sparc/libgtop1_1.0.6-1.1_sparc.deb
          MD5 checksum: c10da9a8c30b7570a95d82e73da6bf38
    
      These packages will be moved into the stable distribution on its next
      revision.
    
    --
    ----------------------------------------------------------------------------
    apt-get: deb  http://security.debian.org/ stable/updates main
    dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"8","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":21.43,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"3","type":"x","order":"3","pct":21.43,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.