Gentoo: pam_smb Remote buffer overflow vulnerability
Summary
- - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200309-01 - - ---------------------------------------------------------------------
- - ---------------------------------------------------------------------
quote from Debian DSA-374-1:
"If a long password is supplied, this can cause a buffer overflow which could be exploited to execute arbitrary code with the privileges of the process which invokes PAM services."
SOLUTION
It is recommended that all Gentoo Linux users who are running net-misc/pam_smb upgrade to pam_smb-2.0.0_rc5 as follows
emerge sync emerge pam_smb emerge clean
- - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - - ---------------------------------------------------------------------
Resolution
References
Availability
Concerns
Background