Date: Wed, 5 Apr 2000 22:05:02 +0200 (MEST) 
From: Marc Heuse marc@suse.de 
Subject: [suse-security-announce] SuSE Security Announcement - kreatecd 


--------------------------------------------------------------------------------
SuSE Security Announcement 
Package: kreatecd < 0.3.8b 
Date: Wed, 5 Apr 2000 20:00:12 GMT 

Affected SuSE versions: 6.4 
Vulnerability Type: local root compromise 
SuSE default package: no 
Other affected systems: all unix systems using kreatecd 


--------------------------------------------------------------------------------
A security hole was discovered in the package mentioned above. Please update as soon as possible or disable the service if you are using this software on your SuSE Linux installation(s). 
Other Linux distributions or operating systems might be affected as well, please contact your vendor for information about this issue. 

Please note that we provide this information on an "as-is" basis only. There is no warranty whatsoever and no liability for any direct, indirect or incidental damage arising from this information or the installation of the update package. 


--------------------------------------------------------------------------------
1. Problem Description 
kreatecd is a KDE tool used to burn cd-roms. An exploitable buffer overflow was found in this tool. 

2. Impact 

Local users may gain root privilige. 

3. Solution 

Update the package from our FTP server, or remove the suid bit from this tool. ("chmod u-s /opt/kde/bin/kreatecd") 


--------------------------------------------------------------------------------
Please verify these md5 checksums of the updates before installing: 
742ed57b8bfb022d4e3755e417612272 /6.4/kpa1/kreatecd-0.3.8b-0.alpha.rpm 
09cbe9a08cf2b0d5d5d0b1963c3edbcd  
e59c71fa6ae5cf59af9aa1bdce89b015  


--------------------------------------------------------------------------------
You can find updates on our ftp-Server: 
 for Intel processors 
 for Alpha processors 

or try the following web pages for a list of mirrors: 
http://www.suse.de/ftp.html 
 

Our webpage for patches: 
http://www.suse.de/patches/index.html 

Our webpage for security announcements: 
http://www.suse.de/security 

If you want to report vulnerabilities, please contact security@suse.de

KDE buffer overflow in SuSE

April 5, 2000
kreatecd is a KDE tool used to burn cd-roms

Summary

Date: Wed, 5 Apr 2000 22:05:02 +0200 (MEST) 
From: Marc Heuse marc@suse.de 
Subject: [suse-security-announce] SuSE Security Announcement - kreatecd 


--------------------------------------------------------------------------------
SuSE Security Announcement 
Package: kreatecd < 0.3.8b 
Date: Wed, 5 Apr 2000 20:00:12 GMT 

Affected SuSE versions: 6.4 
Vulnerability Type: local root compromise 
SuSE default package: no 
Other affected systems: all unix systems using kreatecd 


--------------------------------------------------------------------------------
A security hole was discovered in the package mentioned above. Please update as soon as possible or disable the service if you are using this software on your SuSE Linux installation(s). 
Other Linux distributions or operating systems might be affected as well, please contact your vendor for information about this issue. 

Please note that we provide this information on an "as-is" basis only. There is no warranty whatsoever and no liability for any direct, indirect or incidental damage arising from this information or the installation of the update package. 


--------------------------------------------------------------------------------
1. Problem Description 
kreatecd is a KDE tool used to burn cd-roms. An exploitable buffer overflow was found in this tool. 

2. Impact 

Local users may gain root privilige. 

3. Solution 

Update the package from our FTP server, or remove the suid bit from this tool. ("chmod u-s /opt/kde/bin/kreatecd") 


--------------------------------------------------------------------------------
Please verify these md5 checksums of the updates before installing: 
742ed57b8bfb022d4e3755e417612272 /6.4/kpa1/kreatecd-0.3.8b-0.alpha.rpm 
09cbe9a08cf2b0d5d5d0b1963c3edbcd  
e59c71fa6ae5cf59af9aa1bdce89b015  


--------------------------------------------------------------------------------
You can find updates on our ftp-Server: 
 for Intel processors 
 for Alpha processors 

or try the following web pages for a list of mirrors: 
http://www.suse.de/ftp.html 
 

Our webpage for patches: 
http://www.suse.de/patches/index.html 

Our webpage for security announcements: 
http://www.suse.de/security 

If you want to report vulnerabilities, please contact security@suse.de

References

Severity

Related News