Security hole in termcap

    Date08 Dec 1999
    CategorySuSE
    3338
    Posted ByLinuxSecurity Advisories
    A buffer overflow has been found in libtermcap's tgetent() function. If a setuid root program uses this function, the user could execute arbitrary code. SuSE Linux 6.0, 6.1 and 6.2 are not affected, since the only program using libtermcap is bc. This program is not setuid root.
    ______________________________________________________________________________
    
                            SuSE Security Announcement
    
            Package:  termcap-2.0.8-x
            Date:     Tue Aug 24 20:08:11 CEST 1999
            Affected: all Linux distributions using libtermcap
    ______________________________________________________________________________
    
    A security hole was discovered in the package mentioned above.
    Please update as soon as possible or disable the service if you are using
    this software on your SuSE Linux installation(s).
    
    Other Linux distributions or operating systems might be affected as
    well, please contact your vendor for information about this issue.
    
    Please note, that that we provide this information on as "as-is" basis only.
    There is no warranty whatsoever and no liability for any direct, indirect or
    incidental damage arising from this information or the installation of
    the update package.
    _____________________________________________________________________________
    
    1. Problem Description
    
      A buffer overflow has been found in libtermcap's tgetent() function.
      If a setuid root program uses this function, the user could execute
      arbitrary code. SuSE Linux 6.0, 6.1 and 6.2 are not affected, since
      the only program using libtermcap is bc. This program is not setuid
      root.
    
    2. Impact
    
      If you install a third party product, which is setuid root and linked
      against libtermcap, a user could use this buffer overflow to gain root
      privileges by supplying his own termcap file.
    
    3. Solution
    
      Updated the termcap package from our FTP server.
    ______________________________________________________________________________
    
    Here are the md5 checksums of the upgrade packages, please verify these
    before installing the new packages:
    
      8a66d699a86d656f56841b2c597a8ef9  termcap-2.0.8-80.alpha.rpm
      662c6bacad9e9eedfa9333afada4d338  termcap-2.0.8-80.i386.rpm   (6.1)
      1ccf4946caa99e0ffbed5fab6a0e768c  termcap-2.0.8-80.i386.rpm   (6.2)
    ______________________________________________________________________________
    
    You will find the update on our ftp-Server:
    
      ftp://ftp.suse.com/pub/suse/axp/update/6.1/a1/termcap.rpm
      ftp://ftp.suse.com/pub/suse/i386/update/6.1/a1/termcap.rpm
      ftp://ftp.suse.com/pub/suse/i386/update/6.2/a1/termcap.rpm
    
    Webpage for patches:
            http://www.suse.de/patches/index.html
    
    or try the following web pages for a list of mirrors:
    
            http://www.suse.de/ftp.html
            http://www.suse.com/ftp_new.html
    
    ______________________________________________________________________________
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.11,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.