Date:         Mon, 7 Jan 2008 16:54:12 -0600
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA for tog-pegasus on SL5.x, SL4.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Critical: tog-pegasus security update
Issue date:	2008-01-07
CVE Names:	CVE-2008-0003

During a security audit, a stack buffer overflow flaw was found in the PAM
authentication code in the OpenPegasus CIM management server. An
unauthenticated remote user could trigger this flaw and potentially execute
arbitrary code with root privileges. (CVE-2008-0003)

Users of tog-pegasus should upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing the
updated packages the tog-pegasus service should be restarted.

SL 4.x

    SRPMS:
tog-pegasus-2.5.1-5.el4_6.1.src.rpm
    i386:
tog-pegasus-2.5.1-5.el4_6.1.i386.rpm
tog-pegasus-devel-2.5.1-5.el4_6.1.i386.rpm
tog-pegasus-test-2.5.1-5.el4_6.1.i386.rpm
    x86_64:
tog-pegasus-2.5.1-5.el4.1.x86_64.rpm
tog-pegasus-devel-2.5.1-5.el4.1.x86_64.rpm
tog-pegasus-test-2.5.1-5.el4.1.x86_64.rpm

SL 5.x

    SRPMS:
tog-pegasus-2.6.1-2.el5_1.1.src.rpm
    i386:
tog-pegasus-2.6.1-2.el5_1.1.i386.rpm
tog-pegasus-devel-2.6.1-2.el5_1.1.i386.rpm
    x86_64:
tog-pegasus-2.6.1-2.el5_1.1.i386.rpm
tog-pegasus-2.6.1-2.el5_1.1.x86_64.rpm
tog-pegasus-devel-2.6.1-2.el5_1.1.i386.rpm
tog-pegasus-devel-2.6.1-2.el5_1.1.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2008-0003 tog-pegasus SL5.x, SL4.x i386/x86_64

Critical: tog-pegasus security update

Summary

Date:         Mon, 7 Jan 2008 16:54:12 -0600Reply-To:     Troy Dawson Sender:       Security Errata for Scientific Linux              From:         Troy Dawson Subject:      Security ERRATA for tog-pegasus on SL5.x, SL4.x i386/x86_64Comments: To: "scientific-linux-errata@fnal.gov"          Synopsis:	Critical: tog-pegasus security updateIssue date:	2008-01-07CVE Names:	CVE-2008-0003During a security audit, a stack buffer overflow flaw was found in the PAMauthentication code in the OpenPegasus CIM management server. Anunauthenticated remote user could trigger this flaw and potentially executearbitrary code with root privileges. (CVE-2008-0003)Users of tog-pegasus should upgrade to these updated packages, whichcontain a backported patch to resolve this issue. After installing theupdated packages the tog-pegasus service should be restarted.SL 4.x    SRPMS:tog-pegasus-2.5.1-5.el4_6.1.src.rpm    i386:tog-pegasus-2.5.1-5.el4_6.1.i386.rpmtog-pegasus-devel-2.5.1-5.el4_6.1.i386.rpmtog-pegasus-test-2.5.1-5.el4_6.1.i386.rpm    x86_64:tog-pegasus-2.5.1-5.el4.1.x86_64.rpmtog-pegasus-devel-2.5.1-5.el4.1.x86_64.rpmtog-pegasus-test-2.5.1-5.el4.1.x86_64.rpmSL 5.x    SRPMS:tog-pegasus-2.6.1-2.el5_1.1.src.rpm    i386:tog-pegasus-2.6.1-2.el5_1.1.i386.rpmtog-pegasus-devel-2.6.1-2.el5_1.1.i386.rpm    x86_64:tog-pegasus-2.6.1-2.el5_1.1.i386.rpmtog-pegasus-2.6.1-2.el5_1.1.x86_64.rpmtog-pegasus-devel-2.6.1-2.el5_1.1.i386.rpmtog-pegasus-devel-2.6.1-2.el5_1.1.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity

Related News