Gentoo: mgetty Multiple vulnerabilities
Summary
- - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200304-09 - - --------------------------------------------------------------------- FIXED VERSION : >=mgetty-1.1.29
- - ---------------------------------------------------------------------
* faxspool in mgetty before 1.1.29 uses a world-writable spool directory for outgoing faxes, which allows local users to modify fax transmission privileges.
* Buffer overflow in cnd-program for mgetty before 1.1.29 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a Caller ID string with a long CallerName argument.
SOLUTION
It is recommended that all Gentoo Linux users who are running net-dialup/mgetty upgrade to mgetty-1.1.30 as follows:
emerge sync emerge mgetty emerge clean
Resolution
References
Availability
Concerns
Background