SA-1997.14.txt
f82365bf3745eb501a1d6a69f95d190947a1faac2e14342be772c9551a51a3fd
-----BEGIN PGP SIGNED MESSAGE-----
Subject: Caldera Security Advisory SA-1997.14: Vulnerability in "db" library
Caldera Security Advisory SA-1997.14
Original report date: 08-Jul-1997
RPM build date: 09-Jul-1997
Original issue date: 03-Sep-1997
Topic: Vulnerability in the "db" library
I. Problem Description
Package db-1.85.4 contains the Berkeley Database Package (DB)
which is a programmatic toolkit to provide database support for
applications. This package uses incomplete implementations of
the snprintf() and vsnprintf() functions in such a manner to
make applications that use the "db" library vulnerable to stack
overrun exploits.
II. Impact
Required libraries are to be updated to alleviate potential
security problems. Various applications using the (DB) package
are susceptible to stack overrun exploits.
The following Caldera releases are affected:
Base 1.0
Base 1.1
Lite 1.1
Standard 1.1
Those who use one of the above releases may verify if they are
affected by running the following:
rpm -q db
If version "db-1.85.4-2" (or older) is installed, a fix is required.
III. Solution
There are both a temporary and permanent fix. The temporary fix
applies to those that are not connected to the Internet or WILL
NEVER connect to the Internet.
cd /user/lib
test -w libdb.a && ar ds libdb.a snprintf.o vsnprintf.o
SO=libdb.so.1.85.4
objcopy -v -N snprintf -N vsnprintf $SO $SO-new
chmod 755 $SO-new && /sbin/ldconfig
The permanent fix will update your current db package.
One would update by running the following:
rpm -U RPMS/db-1.85.4-3.i386.rpm
rpm -q db-devel && rpm -U RPMS/db-devel-1.85.4-3.i386.rpm
These updates are on Caldera's FTP server (ftp://ftp.caldera.com):
/pub/openlinux/updates/1.1/current/RPMS/ for the binaries.
/pub/openlinux/updates/1.1/current/SRPMS/ for the sources.
The MD5 checksums (from the "md5sum" command) for these packages are:
72297de7ee245405eac15596afb0dc28 RPMS/db-1.85.4-3.i386.rpm
dc35c982d3c017f46a9ac6efe93513e0 RPMS/db-devel-1.85.4-3.i386.rpm
694c42ca0984a58dbfd2ce44478770b1 SRPMS/db-1.85.4-3.src.rpm
IV. References
Security problem around snprintf() as announced to the
"linux-security" email list by Thomas Roessler <roessler@guug.de>
on Tue, 8 Jul 1997 21:33:55 +0200. Message ID:
<19970708213355.43189@sobolev.rhein.de>.
This and other Caldera security resources are located at:
http://www.caldera.com/tech-ref/security/
This advisory closes Caldera's internal bug report #856
V. PGP Signature
This message was signed with the PGP key for <security@caldera.com>.
This key can be obtained from:
ftp://ftp.caldera.com/pub/pgp-keys/
Or on an OpenLinux CDROM under:
/OpenLinux/pgp-keys/
$Id: SA-1997.14,v 1.2 1997/09/03 18:38:53 ron Exp $
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv
iQCVAwUBNA2vNen+9R4958LpAQFAaQQAuuxkPLGovW/oxZLd3AaQ2q3U+YaNOZnP
+Zu2rqPO/TlSdh15WwEVIy35v48HDa0Bw8EAGZxW7Ng4suc8HlFdqLJm5NQZ5WE/
2XQQyZO4sBjAUj5Z/E8b93E3xgwcxUTlL3/7xYy7KjFQcR3Ny9kd9cSSvDi+R698
tcaOxCGniTM=
=JPO9
-----END PGP SIGNATURE-----