Linux-Mandrake Security Update: Package: cdrecordJun 06, 2000, 01:25 (0 Talkback[s])
(Other stories by Chmouel Boudjnah)
Date: Sat, 3 Jun 2000 19:17:45 +0200
Linux-Mandrake Security Update
Affected versions: 6.1 7.0
Problem: The linux cdrecord binary is vulnerable to a locally exploitable buffer overflow attack. When installed on a Linux-Mandrake distribution, it is by default setgid "cdburner" (which is a group, gid: 80, that is created for the application). The overflow condition is the result of no bounds checking on the 'dev=' argument passed to cdburner at execution time. This vulnerability can be exploited to execute arbitrary commands with the gid "cdburner".
Please upgrade to:
To upgrade automatically, use « MandrakeUpdate ». If you want to upgrade manually, download the updated package from one of our FTP server mirrors and uprade with "rpm -Uvh package_name". All mirrors are listed on http://www.mandrake.com/en/ftp.php3 Updated packages are available in the "updates/" directory.
For example, if you are looking for an updated RPM package for Mandrake 7.0, look for it in: updates/7.0/RPMS/
Note: we give the md5 sum for each package. It lets you check the integrity of the downloaded package by running the md5sum command on the package ("md5sum package.rpm").
MandrakeSoft Inc http://www.mandrakesoft.com In travel. --Chmouel