Red Hat: 'analog' buffer overflow
Summary
Summary
Previous releases of analog were vulnerable to a buffer overflowvulnerability where a malicious user could use an ALIAS command toconstruct very long strings which were not checked for length.This bug was discovered by the program author, and there is no knownexploit.
Solution
To update all RPMs for your particular architecture, run:
rpm -Fvh
where
5. Bug IDs fixed ( for more info):
6. RPMs required:
Red Hat Secure Web Server 2.0:
SRPMS:
i386:
7. Verification:
MD5 sum Package Name
a9a47be6fa6230bd29db2f4ff36f9f98 2.0/SRPMS/analog-4.16-1.src.rpm
5e52037dfd712a36a0aaec4b60bfba35 2.0/i386/analog-4.16-1.i386.rpm
d7e7b05487b8cc744d90de91e0e184eb 2.0/i386/analog-form-4.16-1.i386.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
You can verify each package with the following command:
rpm --checksig
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg
References
Thanks to Stephen Turner for posting the origional advisory on Bugtraq. Copyright(c) 2000, 2001 Red Hat, Inc. `
Package List
Topic
Topic
Updated analog packages are available which fix a buffer overflow
vulnerability.
Relevant Releases Architectures
Red Hat Secure Web Server 2.0 - i386
Bugs Fixed