aboutsummaryrefslogtreecommitdiffstats
path: root/polish/security/2004/dsa-494.wml
blob: 2d715880e6a94acc53b0dc7b92b8080469039d65 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
#use wml::debian::translation-check translation="1.2" maintainer=""
#pddp arteek
<define-tag description>buffer overflow</define-tag>
<define-tag moreinfo>
<p>Jack &lt;<email "jack@rapturesecurity.org">&gt; discovered a buffer overflow in
ident2, an implementation of the ident protocol (RFC1413), where a
buffer in the child_service function was slightly too small to hold
all of the data which could be written into it.  This vulnerability
could be exploited by a remote attacker to execute arbitrary code with
the privileges of the ident2 daemon (by default, the "identd" user).</p>

<p>For the current stable distribution (woody) this problem has been
fixed in version 1.03-3woody1.</p>

<p>For the unstable distribution (sid), this problem will be fixed soon.</p>

<p>We recommend that you update your ident2 package.</p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/security/2004/dsa-494.data"

© 2014-2024 Faster IT GmbH | imprint | privacy policy