TurboLinux Security Announcement: Package: dump-0.4b11-1 and earlierMar 15, 2000, 20:49 (1 Talkback[s])
(Other stories by Katie Moussouris)
Date: Wed, 15 Mar 2000 12:09:33 -0800 (PST)
TurboLinux Security Announcement
Package: dump-0.4b11-1 and earlier
Affected TurboLinux versions: 6.0.2 and earlier
A security hole was discovered in the package mentioned above. Please update the package in your installation as soon as possible or disable the service.
1. Problem Summary
The dump utility is setuid and setgid root. Previous versions of dump did not correctly drop the effective gid settings. When passed an oversized argument to the "-f a" parameters, it will overrun the stack. If this argument is crafted properly, it may be possible to replace the instruction pointer or return address on the stack and execute arbitrary code with the permissions of the process (gid of root).
An attacker could use this overrun to execute code with the gid of root, leading to further system compromise.
Update the package from our ftp server by running the following command:
rpm -Fv ftp_path_to_filename
Where ftp_path_to_filename is the following:
The source rpm can be downloaded here:
**Note: You must rebuild and install the rpm if you choose to download and install the srpm. Simply installing the srpm alone WILL NOT CLOSE THE SECURITY HOLE.
Please verify the md5 checksum of the update before you install:
MD5 sum Package Name
0a3777c176c1580fe44f03acfdc70f59 dump-0.4b16-1.i386.rpm 64f95b579e6a813f2f207f1817d8c5e8 dump-0.4b16-1.src.rpm
You can find more updates on our ftp server:
for TL6.0 Workstation and Server security updates
Our webpage for security announcements:
If you want to report vulnerabilities, please contact: email@example.com
Subscribe to the TurboLinux Security Mailing lists:
TL-security - A moderated list for discussing security issues in TurboLinux products. Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security
TL-security-announce - An announce-only mailing list for
security updates and alerts. Subscribe at