exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

SA-1997.14.txt

SA-1997.14.txt
Posted Sep 23, 1999

SA-1997.14.txt

SHA-256 | f82365bf3745eb501a1d6a69f95d190947a1faac2e14342be772c9551a51a3fd

SA-1997.14.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

Subject: Caldera Security Advisory SA-1997.14: Vulnerability in "db" library

Caldera Security Advisory SA-1997.14
Original report date: 08-Jul-1997
RPM build date: 09-Jul-1997
Original issue date: 03-Sep-1997

Topic: Vulnerability in the "db" library

I. Problem Description

Package db-1.85.4 contains the Berkeley Database Package (DB)
which is a programmatic toolkit to provide database support for
applications. This package uses incomplete implementations of
the snprintf() and vsnprintf() functions in such a manner to
make applications that use the "db" library vulnerable to stack
overrun exploits.

II. Impact

Required libraries are to be updated to alleviate potential
security problems. Various applications using the (DB) package
are susceptible to stack overrun exploits.

The following Caldera releases are affected:

Base 1.0
Base 1.1
Lite 1.1
Standard 1.1

Those who use one of the above releases may verify if they are
affected by running the following:

rpm -q db

If version "db-1.85.4-2" (or older) is installed, a fix is required.

III. Solution

There are both a temporary and permanent fix. The temporary fix
applies to those that are not connected to the Internet or WILL
NEVER connect to the Internet.

cd /user/lib
test -w libdb.a && ar ds libdb.a snprintf.o vsnprintf.o
SO=libdb.so.1.85.4
objcopy -v -N snprintf -N vsnprintf $SO $SO-new
chmod 755 $SO-new && /sbin/ldconfig

The permanent fix will update your current db package.
One would update by running the following:

rpm -U RPMS/db-1.85.4-3.i386.rpm
rpm -q db-devel && rpm -U RPMS/db-devel-1.85.4-3.i386.rpm

These updates are on Caldera's FTP server (ftp://ftp.caldera.com):

/pub/openlinux/updates/1.1/current/RPMS/ for the binaries.
/pub/openlinux/updates/1.1/current/SRPMS/ for the sources.

The MD5 checksums (from the "md5sum" command) for these packages are:

72297de7ee245405eac15596afb0dc28 RPMS/db-1.85.4-3.i386.rpm
dc35c982d3c017f46a9ac6efe93513e0 RPMS/db-devel-1.85.4-3.i386.rpm
694c42ca0984a58dbfd2ce44478770b1 SRPMS/db-1.85.4-3.src.rpm

IV. References

Security problem around snprintf() as announced to the
"linux-security" email list by Thomas Roessler <roessler@guug.de>
on Tue, 8 Jul 1997 21:33:55 +0200. Message ID:
<19970708213355.43189@sobolev.rhein.de>.

This and other Caldera security resources are located at:

http://www.caldera.com/tech-ref/security/

This advisory closes Caldera's internal bug report #856

V. PGP Signature

This message was signed with the PGP key for <security@caldera.com>.

This key can be obtained from:
ftp://ftp.caldera.com/pub/pgp-keys/

Or on an OpenLinux CDROM under:
/OpenLinux/pgp-keys/

$Id: SA-1997.14,v 1.2 1997/09/03 18:38:53 ron Exp $

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBNA2vNen+9R4958LpAQFAaQQAuuxkPLGovW/oxZLd3AaQ2q3U+YaNOZnP
+Zu2rqPO/TlSdh15WwEVIy35v48HDa0Bw8EAGZxW7Ng4suc8HlFdqLJm5NQZ5WE/
2XQQyZO4sBjAUj5Z/E8b93E3xgwcxUTlL3/7xYy7KjFQcR3Ny9kd9cSSvDi+R698
tcaOxCGniTM=
=JPO9
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close