Joined: 12 May 2004
|Posted: Tue Jun 03, 2008 4:26 pm Post subject: [ GLSA 200806-01 ] mtr: Stack-based buffer overflow
|Gentoo Linux Security Advisory
Title: mtr: Stack-based buffer overflow (GLSA 200806-01)
Date: June 03, 2008
A stack-based buffer overflow was found in mtr, possibly resulting in the
execution of arbitrary code.
mtr combines the functionality of the 'traceroute' and 'ping' programs
in a single network diagnostic tool.
Vulnerable: < 0.73-r1
Unaffected: >= 0.73-r1
Architectures: All supported architectures
Adam Zabrocki reported a boundary error within the split_redraw()
function in the file split.c, possibly leading to a stack-based buffer
A remote attacker could use a specially crafted resolved hostname to
execute arbitrary code with root privileges. However, it is required
that the attacker controls the DNS server used by the victim, and that
the "-p" (or "--split") command line option is used.
There is no known workaround at this time.
All mtr users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/mtr-0.73-r1"
Last edited by GLSA on Thu Mar 06, 2014 4:28 am; edited 2 times in total