snort/file Update for Mandrake
Posted on: 03/07/2003 01:14 PM

MandrakeSoft has released two security updates for Mandrake Linux

MDKSA-2003:029 : snort

A buffer overflow was discovered in the snort RPC normalization routines by ISS-XForce which can cause snort to execute arbitrary code embedded within sniffed network packets. The rpc_decode preprocessor is enabled by default. The snort developers have released version 1.9.1 to correct this behaviour; snort versions from 1.8 up to 1.9.0 are vulnerable.

Read more

MDKSA-2003:030 : file

A memory allocation problem in file was found by Jeff Johnson, and a stack overflow corruption problem was found by David Endler. These problems have been corrected in file version 3.41 and likely affect all previous version. These problems pose a security threat as they can be used to execute arbitrary code by an attacker under the privileges of another user. Note that the attacker must first somehow convince the target user to execute file against a specially crafted file that triggers the buffer overflow in file.

Read more




Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/snortfile_update_for_mandrake.html)