- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200304-09
- - ---------------------------------------------------------------------

          PACKAGE : mgetty
          SUMMARY : buffer overflow, insecure spool dir
             DATE : 2003-04-28 10:17 UTC
          EXPLOIT : remote
VERSIONS AFFECTED : =mgetty-1.1.29
              CVE : CAN-2002-1391 CAN-2002-1392

- - ---------------------------------------------------------------------

* faxspool in mgetty before 1.1.29 uses a world-writable spool directory
  for outgoing faxes, which allows local users to modify fax transmission
  privileges.

* Buffer overflow in cnd-program for mgetty before 1.1.29 allows remote
  attackers to cause a denial of service and possibly execute arbitrary
  code via a Caller ID string with a long CallerName argument.

SOLUTION

It is recommended that all Gentoo Linux users who are running
net-dialup/mgetty upgrade to mgetty-1.1.30 as follows:

emerge sync
emerge mgetty
emerge clean

Gentoo: mgetty Multiple vulnerabilities

World-writable spool directory and buffer overflow in cnd-program have been fixed

Summary


- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200304-09
- - ---------------------------------------------------------------------
    FIXED VERSION : >=mgetty-1.1.29

- - ---------------------------------------------------------------------
* faxspool in mgetty before 1.1.29 uses a world-writable spool directory for outgoing faxes, which allows local users to modify fax transmission privileges.
* Buffer overflow in cnd-program for mgetty before 1.1.29 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a Caller ID string with a long CallerName argument.
SOLUTION
It is recommended that all Gentoo Linux users who are running net-dialup/mgetty upgrade to mgetty-1.1.30 as follows:
emerge sync emerge mgetty emerge clean


Resolution

References

Availability

Concerns

Severity
PACKAGE : mgetty
SUMMARY : buffer overflow, insecure spool dir
DATE : 2003-04-28 10:17 UTC
EXPLOIT : remote
VERSIONS AFFECTED :
CVE : CAN-2002-1391 CAN-2002-1392

Synopsis

Background

Affected Packages

Impact

Workaround

Related News