SuSE: 2006-002: novell-nrm remote heap overflow Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: novell-nrm
Announcement ID: SUSE-SA:2006:002
Date: Fri, 13 Jan 2006 15:00:00 +0000
Affected Products: Open Enterprise Server
Vulnerability Type: remote code execution
Severity (1-10): 10
SUSE Default Package: yes
Cross-References: CVE-2005-3655
Content of This Advisory:
1) Security Vulnerability Resolved:
remote heap overflow
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
iDEFENSE reported a security problem with the Novell Remote Manager.
By passing a huge or negative size via a HTTP request header to
httpstkd it was possible to corrupt heap memory and so potentially
execute code.
We have released updated packages for this problem.
The affected novell-nrm package is only included in the Open Enterprise
Server.
This issue is tracked by the Mitre CVE ID CVE-2005-3655.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
None
4) Package Location and Checksums
The preferred method for installing security updates on Open Enterprise
Server is Red Carpet / ZLM.
The packages are also offered for installation from the maintenance web:
https://www.suse.com:443/
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References