SuSE: gdm root compromise vulnerability
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: gdm <= 2.0beta4-25
Date: Wed May 24 08:35:39 CET 2000
Affected SuSE versions: 6.2-6.4
Vulnerability Type: remote compromise
SuSE default package: no
Other affected systems: all linux systems using gdm <= 2.0beta4
______________________________________________________________________________
A security hole was discovered in the package mentioned above.
Please update it as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.
Please note that we provide this information on an "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________
1. Problem Description
The GNOME package includes a xdm replacement called gdm for handling
graphical console and network logins.
The gdm code, that process' logins over the network, could be tricked
into writing data from the network right into the stack. This condition
exists while gdm is running with root privileges and before the user is
authenticated.
2. Impact
An remote adversary could crash gdm or execute his own code, which
leads to root compromise of the system running gdm.
3. Solution
By default gdm doesn't accept login connection from the network.
Older SuSE releases, which include gdm 1.x, allow network logins
by default but aren't vulnerable by this bug.
If you need the network login feature of gdm, update the package
from our FTP server, please.
______________________________________________________________________________
Please verify these md5 checksums of the updates before installing:
(For SuSE 6.0, please use the 6.1 updates)
AXP:
ffb656afe38ee6e5c04789f8fce8b1a8 f5c7bf9b8fd133e74481ecd6c0d5678e 928d262fd9e8f1ff40e6f84b560daf7b 6f8a0cc01b9b37f5d6b7bf93b138afb2
i386:
8a8adfa55587b1db0cf9816e7d8839c6 /6.2/gnm2/gdm-2.0beta4-72.i386.rpm
fea8fda701692bea4fb658edc7a504ea /6.2/zq1/gdm-2.0beta4-72.src.rpm
be26d14f8693d50002a5462c28a45d5a /6.3/gnm2/gdm-2.0beta4-72.i386.rpm
bcc226af12ce171d4aa41c6d490d2b8f /6.3/zq1/gdm-2.0beta4-72.src.rpm
372583d0633d4d0115e6f3bc8397cf16 /6.4/gnm2/gdm-2.0beta4-72.i386.rpm
33896dd68321aa45c837da34547debf5 /6.4/zq1/gdm-2.0beta4-72.src.rpm
______________________________________________________________________________
You can find updates on our ftp-Server:
for Intel processors for Alpha processors
or try the following web pages for a list of mirrors:
http://www.suse.de/ftp.html
Our webpage for patches:
http://www.suse.de/patches/index.html
Our webpage for security announcements:
http://www.suse.de/security
If you want to report vulnerabilities, please contact
security@suse.de
______________________________________________________________________________
SuSE has got two free security mailing list services to which any
interested party may subscribe:
suse-security@suse.com - moderated and for general/linux/SuSE
security discussions. All SuSE security
announcements are sent to this list.
suse-security-announce@suse.com - SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent
to this list.
To subscribe to the list, send a message to:
References