---

Caldera Systems releases updated amd

______________________________________________________________________________
                   Caldera Systems, Inc.  Security Advisory

Subject:                buffer overflow in amd
Advisory number:        CSSA-1999:024.0
Issue date:             1999 August, 27
Cross reference:
______________________________________________________________________________

1. Problem Description

There is a buffer overflow in AMD, the automounter daemon. It
can be exploited by a remote attacker to obtain super user
privilege on the attacked host.

2. Vulnerable Versions

Systems : COL 2.2
Packages: am-utils-6.0-7

3. Solutions

Workaround: none

The proper solution is to upgrade to the latest packages

rpm -U am-utils-6.0-7.i386.rpm

4. Location of Fixed Packages

The upgrade packages can be found on Caldera’s FTP site at:


ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.2/current/RPMS/

The corresponding source code package can be found at:


ftp://ftp.calderaystems.com/pub/OpenLinux/updates/2.2/current/SRPMS

5. Installing Fixed Packages

Upgrade the affected packages with the following commands:

rpm -U am-utils-6.0-7.i386.rpm

6. Verification

   9f60c7a0175ae288c821e4a4493ad9c9  RPMS/am-utils-6.0-7.i386.rpm
   94094e382d5ce609146d1e155cb87e3f  SRPMS/am-utils-6.0-7.src.rpm

7. References

This and other Caldera security resources are located at:

http://www.calderasystems.com/news/security/index.html

This security fix closes Caldera’s internal Problem Report
5093

8. Disclaimer

Caldera Systems, Inc. is not responsible for the misuse of any
of the information we provide on this website and/or through our
security advisories. Our advisories are a service to our customers
intended to promote secure installation and use of Caldera
OpenLinux.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis