Gentoo: exim local root vulnerability
Summary
- -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200212-5 - -------------------------------------------------------------------- DATE : 2002-12-16 16:12 UTC
- --------------------------------------------------------------------
From advisory:
"This is a format string bug in daemon.c, line 976:
sprintf(CS buff, CS pid_file_path, ""); /* Backward compatibility */
pid_file_path can be changed on the command line. This line is in the function daemon_go(), which only gets executed when the user is an exim-admin-user."
Read the full advisory at http://marc.theaimsgroup.com/?l=bugtraq&m=103903403527788&w=2
SOLUTION
It is recommended that all Gentoo Linux users who are running net-mail/exim-4.05 and earlier update their systems as follows:
emerge rsync emerge exim emerge clean
- ----------...Read the Full Advisory