- - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200302-13 - - --------------------------------------------------------------------- PACKAGE : apcupsd SUMMARY : remote root vulnerability and buffer overflows DATE : 2003-02-24 10:05 UTC EXPLOIT : remote VERSIONS AFFECTED : <3.10.5 FIXED VERSION : 3.10.5 - - --------------------------------------------------------------------- - From Mandrake Linux Security Update Advisory MDKSA-2003:018: "A remote root vulnerability in slave setups and some buffer overflows in the network information server code were discovered by the apcupsd developers." Read the full advisory at: http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:018 SOLUTION It is recommended that all Gentoo Linux users who are running sys-apps/apcupsd upgrade to apcupsd-3.10.5 as follows: emerge sync emerge -u apcupsd emerge clean - - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz zwelch@gentoo.org - - --------------------------------------------------------------------- - - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200302-16 - - --------------------------------------------------------------------- PACKAGE : vnc SUMMARY : insecure cookie generation DATE : 2003-02-24 11:35 UTC EXPLOIT : remote VERSIONS AFFECTED : <3.3.6-r1 FIXED VERSION : 3.3.6-r1 - - --------------------------------------------------------------------- - From Red Hat Security Advisory RHSA-2003:041-12: "The VNC server acts as an X server, but the script for starting it generates an MIT X cookie (which is used for X authentication) without using a strong enough random number generator. This could allow an attacker to be able to more easily guess the authentication cookie." Read the full advisory at: https://rhn.redhat.com/errata/RHSA-2003-041.html SOLUTION It is recommended that all Gentoo Linux users who are running net-misc/vnc upgrade to vnc-3.3.6-r1 as follows: emerge sync emerge -u vnc emerge clean - - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz - - --------------------------------------------------------------------- - - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200302-15 - - --------------------------------------------------------------------- PACKAGE : tightvnc SUMMARY : insecure cookie generation DATE : 2003-02-24 11:34 UTC EXPLOIT : remote VERSIONS AFFECTED : <1.2.8 FIXED VERSION : 1.2.8 - - --------------------------------------------------------------------- - From Red Hat Security Advisory RHSA-2003:041-12: "The VNC server acts as an X server, but the script for starting it generates an MIT X cookie (which is used for X authentication) without using a strong enough random number generator. This could allow an attacker to be able to more easily guess the authentication cookie." Read the full advisory at: https://rhn.redhat.com/errata/RHSA-2003-041.html SOLUTION It is recommended that all Gentoo Linux users who are running net-misc/tightvnc upgrade to tightvnc-1.2.8 as follows: emerge sync emerge -u tightvnc emerge clean - - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz - - ---------------------------------------------------------------------
Gentoo Linux Advisories: apcupsd, vnc, tightvnc
By
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis