Volkerding posted to the slackware-security mailing list:
A buffer overflow has been identified in libtermcap.so.2.0.8 as
found in Slackware 4.0 and earlier, and an exploit for the problem
was posted on BugTraq today. The exploit (using setuid root
/usr/X11R6/bin/xterm) allows anyone with access to X on the machine
to get a root shell. Several packages have been uploaded to
that fix this security hole.
The ChangeLog.txt entry and MD5 sums for the uploaded packages
Sat Aug 28 20:18:45 CDT 1999
These packages fix a buffer overflow problem in libtermcap that can
be exploited to gain unauthorized root access. Below are fixed
versions of the affected packages suitable for use on Slackware 4.0
slakware/a4/elflibs.tgz: Patched buffer overflow in libtermcap.
slakware/d1/libc.tgz: Patched buffer overflow in libtermcap.
slakware/x1/xbin.tgz: Recompiled /usr/X11R6/bin/xterm, which had
been linked against a vulnerable libtermcap.a.
*** Alternate, minimal fix:
The directory below contains only the fixed versions of libtermcap
and xterm. Installing these two packages is also a complete fix for
the problem. In addition, these two upgrades are suitable for use
on Slackware 3.5, 3.6, 3.9, or 4.0.
patches/termcap.tgz: Fixed libtermcap.
patches/xterm.tgz: Fixed xterm.
MD5 sums: d01747b9ffc7c9120f07995ec4e0cb02 slakware/a4/elflibs.tgz 4dee2fd9b1186120793e25661691a1e9 slakware/d1/libc.tgz ba830ade8b7155f8834971119fb98d19 slakware/x1/xbin.tgz 9cd13b1169aa95a3e81d5a65ed12c444 patches/termcap.tgz 3e15d3264664f650e2075c29234edfea patches/xterm.tgz