[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : File problem in /tmp (mgetty)

Title: File problem in /tmp (mgetty)
Released by: Caldera
Date: 15th January 2001
Printable version: Click here
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1



- -----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1



______________________________________________________________________________

   Caldera Systems, Inc.  Security Advisory



Subject: mgetty /tmp problems

Advisory number: CSSA-2001-002.0

Issue date: 2001 January, 12

Cross reference:

______________________________________________________________________________





1. Problem Description



   There is a /tmp/ file problem in the fax reception code of mgetty

   which could allow determined attackers to overwrite system files.



2. Vulnerable Versions



   System                       Package

   -----------------------------------------------------------

   OpenLinux Desktop 2.3        All packages previous to

   mgetty-1.1.22_Aug17-9



   OpenLinux eServer 2.3.1      All packages previous to

   and OpenLinux eBuilder       mgetty-1.1.22_Aug17-9



   OpenLinux eDesktop 2.4 All packages previous to

                                mgetty-1.1.22_Aug17-9



3. Solution



   Workaround:



     none



   The proper solution is to upgrade to the fixed packages



4. OpenLinux Desktop 2.3



   4.1 Location of Fixed Packages



       The upgrade packages can be found on Caldera's FTP site at:



       http://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/



       The corresponding source code package can be found at:



       http://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS



   4.2 Verification



   ab0c2a2536d93e78da9e3dbad00358b4  RPMS/mgetty-1.1.22_Aug17-9.i386.rpm

   eb3a13c3898303078d18f6d6cf5b8ad6  SRPMS/mgetty-1.1.22_Aug17-9.src.rpm



   4.3 Installing Fixed Packages



       Upgrade the affected packages with the following commands:



  rpm -Fhv mgetty-1.1.22_Aug17-9.i386.rpm



5. OpenLinux eServer 2.3.1 and OpenLinux eBuilder for ECential 3.0



   5.1 Location of Fixed Packages



       The upgrade packages can be found on Caldera's FTP site at:



       http://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/



       The corresponding source code package can be found at:



       http://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS



   5.2 Verification



   e590735d575c46ab2035ff16dedafaa9  RPMS/mgetty-1.1.22_Aug17-9.i386.rpm

   eb3a13c3898303078d18f6d6cf5b8ad6  SRPMS/mgetty-1.1.22_Aug17-9.src.rpm



   5.3 Installing Fixed Packages



       Upgrade the affected packages with the following commands:



  rpm -Fhv mgetty-1.1.22_Aug17-9.i386.rpm



6. OpenLinux eDesktop 2.4



   6.1 Location of Fixed Packages



       The upgrade packages can be found on Caldera's FTP site at:



       http://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/



       The corresponding source code package can be found at:



       http://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS



   6.2 Verification



   8f229df2ee1cf6a95c632ed24750aab9  RPMS/mgetty-1.1.22_Aug17-9.i386.rpm

   eb3a13c3898303078d18f6d6cf5b8ad6  SRPMS/mgetty-1.1.22_Aug17-9.src.rpm



   6.3 Installing Fixed Packages



       Upgrade the affected packages with the following commands:



  rpm -Fhv mgetty-1.1.22_Aug17-9.i386.rpm



7. References



   This and other Caldera security resources are located at:



   http://www.calderasystems.com/support/security/index.html



   This security fix closes Caldera's internal Problem Report 8696.



8. Disclaimer



   Caldera Systems, Inc. is not responsible for the misuse of any of the

   information we provide on this website and/or through our security

   advisories. Our advisories are a service to our customers intended to

   promote secure installation and use of Caldera OpenLinux.



9. Acknowledgements



   Caldera Systems, Inc. wishes to thank the Team at Immunix, Greg KH

   at Wirex and Gert Doering for their cooperation.



______________________________________________________________________________

- -----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.0.1 (GNU/Linux)

Comment: For info see http://www.gnupg.org



iD8DBQE6X3iM18sy83A/qfwRAnxaAJ9iGQVbUuRWWxiu5ftHCP/xfryCDQCdF0jn

cpYrw95B6rAoEeBB0RGmN7M=

=GbIo

- -----END PGP SIGNATURE-----

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.0.1 (GNU/Linux)

Comment: For info see http://www.gnupg.org



iEYEARECAAYFAjpjPBAACgkQ18sy83A/qfxxTQCgjyscEDL7ezHRIGrj6lJ67Xfq

tIUAnR175xeQvoFNihEQtoyG0IHc/sFq

=TDOH

-----END PGP SIGNATURE-----








(C) 1999-2000 All rights reserved.