dcsimg
Linux Today: Linux News On Internet Time.




More on LinuxToday


Gentoo Linux Advisories: perl, wget

Dec 20, 2002, 20:29 (0 Talkback[s])

- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200212-6
- - --------------------------------------------------------------------

PACKAGE : perl
SUMMARY : broken safe compartment
DATE    : 2002-12-20 14:12 UTC
EXPLOIT : local

- - --------------------------------------------------------------------

Quote from http://use.perl.org/articles/02/10/06/1118222.shtml?tid=5

"A security hole has been discovered in Safe.pm. When a Safe 
compartment has already been used, there's no guarantee that it's safe 
any longer, because there's a way for code executed within the Safe 
compartment to alter its operation mask. (Thus, programs that use a 
Safe compartment only once aren't affected by this bug"

Mor information is available at
http://groups.google.com/groups?threadm=rt-17744-39131.3.96370682846239%40bugs6.perl.org

SOLUTION

It is recommended that all Gentoo Linux users who are running
sys-devel/perl-5.6.1-r9 or sys-devel/5.8.0-r5 and earlier update their 
systems as follows:

emerge rsync
emerge perl
emerge clean

ALTERNATIVE SOLUTION

If you don't want to or can't upgrade your perl package right away,
you can emerge dev-perl/Safe to accomplish the same solution as above.

- - --------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz
mcummings@gentoo.org
- - --------------------------------------------------------------------

- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200212-7
- - --------------------------------------------------------------------

PACKAGE : wget
SUMMARY : directory traversal
DATE    : 2002-12-20 17:12 UTC
EXPLOIT : remote

- - --------------------------------------------------------------------

Quote from advisory

"A malicious server could potentially overwrite key files to cause a 
denial of service or, in some cases, gain privileges by modifying 
executable files. The risk is mitigated because non-default 
configurations are primarily affected, and the user must be convinced 
to access the malicious server. However, web-based clients may be 
more easily exploited."

Read the full advisory at
http://marc.theaimsgroup.com/?l=bugtraq&m=103962838628940&w=2

SOLUTION

It is recommended that all Gentoo Linux users who are running
net-misc/wget-1.8.2-r1 and earlier update their systems as follows:

emerge rsync
emerge wget
emerge clean

- - --------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz
- - --------------------------------------------------------------------