Debian: 'cfingerd' vulnerability
Summary
Package : cfingerd
Problem type : remote printf format attack
Debian-specific: no
Megyer Laszlo report on Bugtraq that the cfingerd Debian as distributed
with Debian GNU/Linux 2.2 was not careful in its logging code. By
combining this with an off-by-one error in the code that copied the
username from an ident response cfingerd could exploited by a remote
user. Since cfingerd does not drop its root privileges until after
it has determined which user to finger an attacker can gain
root privileges.
This has been fixed in version 1.4.1-1.1, and we recommend that you
upgrade your cfingerd package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Debian GNU/Linux 2.2 alias potato
---------------------------------
Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
Source archives:
MD5 checksum: 9ea177fd9f986c75da499c52c15d9dbe
MD5 checksum: c9b3a1bc6bd2cb2dad3916da82df917c
MD5 chec...