what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SA-1997.14.txt

SA-1997.14.txt
Posted Sep 23, 1999

SA-1997.14.txt

SHA-256 | f82365bf3745eb501a1d6a69f95d190947a1faac2e14342be772c9551a51a3fd

SA-1997.14.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

Subject: Caldera Security Advisory SA-1997.14: Vulnerability in "db" library

Caldera Security Advisory SA-1997.14
Original report date: 08-Jul-1997
RPM build date: 09-Jul-1997
Original issue date: 03-Sep-1997

Topic: Vulnerability in the "db" library

I. Problem Description

Package db-1.85.4 contains the Berkeley Database Package (DB)
which is a programmatic toolkit to provide database support for
applications. This package uses incomplete implementations of
the snprintf() and vsnprintf() functions in such a manner to
make applications that use the "db" library vulnerable to stack
overrun exploits.

II. Impact

Required libraries are to be updated to alleviate potential
security problems. Various applications using the (DB) package
are susceptible to stack overrun exploits.

The following Caldera releases are affected:

Base 1.0
Base 1.1
Lite 1.1
Standard 1.1

Those who use one of the above releases may verify if they are
affected by running the following:

rpm -q db

If version "db-1.85.4-2" (or older) is installed, a fix is required.

III. Solution

There are both a temporary and permanent fix. The temporary fix
applies to those that are not connected to the Internet or WILL
NEVER connect to the Internet.

cd /user/lib
test -w libdb.a && ar ds libdb.a snprintf.o vsnprintf.o
SO=libdb.so.1.85.4
objcopy -v -N snprintf -N vsnprintf $SO $SO-new
chmod 755 $SO-new && /sbin/ldconfig

The permanent fix will update your current db package.
One would update by running the following:

rpm -U RPMS/db-1.85.4-3.i386.rpm
rpm -q db-devel && rpm -U RPMS/db-devel-1.85.4-3.i386.rpm

These updates are on Caldera's FTP server (ftp://ftp.caldera.com):

/pub/openlinux/updates/1.1/current/RPMS/ for the binaries.
/pub/openlinux/updates/1.1/current/SRPMS/ for the sources.

The MD5 checksums (from the "md5sum" command) for these packages are:

72297de7ee245405eac15596afb0dc28 RPMS/db-1.85.4-3.i386.rpm
dc35c982d3c017f46a9ac6efe93513e0 RPMS/db-devel-1.85.4-3.i386.rpm
694c42ca0984a58dbfd2ce44478770b1 SRPMS/db-1.85.4-3.src.rpm

IV. References

Security problem around snprintf() as announced to the
"linux-security" email list by Thomas Roessler <roessler@guug.de>
on Tue, 8 Jul 1997 21:33:55 +0200. Message ID:
<19970708213355.43189@sobolev.rhein.de>.

This and other Caldera security resources are located at:

http://www.caldera.com/tech-ref/security/

This advisory closes Caldera's internal bug report #856

V. PGP Signature

This message was signed with the PGP key for <security@caldera.com>.

This key can be obtained from:
ftp://ftp.caldera.com/pub/pgp-keys/

Or on an OpenLinux CDROM under:
/OpenLinux/pgp-keys/

$Id: SA-1997.14,v 1.2 1997/09/03 18:38:53 ron Exp $

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBNA2vNen+9R4958LpAQFAaQQAuuxkPLGovW/oxZLd3AaQ2q3U+YaNOZnP
+Zu2rqPO/TlSdh15WwEVIy35v48HDa0Bw8EAGZxW7Ng4suc8HlFdqLJm5NQZ5WE/
2XQQyZO4sBjAUj5Z/E8b93E3xgwcxUTlL3/7xYy7KjFQcR3Ny9kd9cSSvDi+R698
tcaOxCGniTM=
=JPO9
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close