GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Jun 03, 2008 4:26 pm Post subject: [ GLSA 200806-01 ] mtr: Stack-based buffer overflow |
|
|
Gentoo Linux Security Advisory
Title: mtr: Stack-based buffer overflow (GLSA 200806-01)
Severity: high
Exploitable: remote
Date: June 03, 2008
Bug(s): #223017
ID: 200806-01
Synopsis
A stack-based buffer overflow was found in mtr, possibly resulting in the
execution of arbitrary code.
Background
mtr combines the functionality of the 'traceroute' and 'ping' programs
in a single network diagnostic tool.
Affected Packages
Package: net-analyzer/mtr
Vulnerable: < 0.73-r1
Unaffected: >= 0.73-r1
Architectures: All supported architectures
Description
Adam Zabrocki reported a boundary error within the split_redraw()
function in the file split.c, possibly leading to a stack-based buffer
overflow.
Impact
A remote attacker could use a specially crafted resolved hostname to
execute arbitrary code with root privileges. However, it is required
that the attacker controls the DNS server used by the victim, and that
the "-p" (or "--split") command line option is used.
Workaround
There is no known workaround at this time.
Resolution
All mtr users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/mtr-0.73-r1" |
References
CVE-2008-2357
Last edited by GLSA on Thu Mar 06, 2014 4:28 am; edited 2 times in total |
|