blob: 2d715880e6a94acc53b0dc7b92b8080469039d65 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
|
#use wml::debian::translation-check translation="1.2" maintainer=""
#pddp arteek
<define-tag description>buffer overflow</define-tag>
<define-tag moreinfo>
<p>Jack <<email "jack@rapturesecurity.org">> discovered a buffer overflow in
ident2, an implementation of the ident protocol (RFC1413), where a
buffer in the child_service function was slightly too small to hold
all of the data which could be written into it. This vulnerability
could be exploited by a remote attacker to execute arbitrary code with
the privileges of the ident2 daemon (by default, the "identd" user).</p>
<p>For the current stable distribution (woody) this problem has been
fixed in version 1.03-3woody1.</p>
<p>For the unstable distribution (sid), this problem will be fixed soon.</p>
<p>We recommend that you update your ident2 package.</p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/security/2004/dsa-494.data"
|