exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

debian.slocate.txt

debian.slocate.txt
Posted Dec 19, 2000
Site debian.org

Debian Security Advisory - A bug in the database reading code of slocate makes possible to overwrite a internal structure with some input. This can be used to trick slocate into executing arbitrary code by pointing it to a carefully crafted database. This is fixed in slocate v2.4.

tags | arbitrary
systems | linux, debian
SHA-256 | 24e59b5dc48649f6a9258edf08a87a8b7537a1b2ddb866b04b56715dceb03bcb

debian.slocate.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory DSA-005-1 security@debian.org
http://www.debian.org/security/ Wichert Akkerman
December 17, 2000
- ------------------------------------------------------------------------


Package : slocate
Problem type : local exploit
Debian-specific: no

Michel Kaempf reported a security problem in slocate (a secure version
of locate, a tool to quickly locate files on a filesystem) on bugtraq
which was originally discovered by zorgon. He discovered there was
a bug in the database reading code which made it overwrite a internal
structure with some input. He then showed this could be exploited
to trick slocate into executing arbitrary code by pointing it to a
carefully crafted database.

This has been fixed in version 2.4-2potato1 and we recommend that you
upgrade your slocate package immediately.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

Source archives:
http://security.debian.org/dists/stable/updates/main/source/slocate_2.4-2potato1.diff.gz
MD5 checksum: 9d15a0e95b501427f697e9031d8e62e8
http://security.debian.org/dists/stable/updates/main/source/slocate_2.4-2potato1.dsc
MD5 checksum: 7effe675baba70e3b30ce41e9d231835
http://security.debian.org/dists/stable/updates/main/source/slocate_2.4.orig.tar.gz
MD5 checksum: 185520e64e7b194b6d448f034e2f1c7a

Alpha architecture:
http://security.debian.org/dists/stable/updates/main/binary-alpha/slocate_2.4-2potato1_alpha.deb
MD5 checksum: 90888e9f21437c6a3e7c7addbd244fdc

ARM architecture:
http://security.debian.org/dists/stable/updates/main/binary-arm/slocate_2.4-2potato1_arm.deb
MD5 checksum: 8904b89a14f7a91f6c205fa37ad67466

Motorola 680x0 architecture:
http://security.debian.org/dists/stable/updates/main/binary-m68k/slocate_2.4-2potato1_m68k.deb
MD5 checksum: 09bd79672ac452a5c10618a368a4b40a

Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/main/binary-i386/slocate_2.4-2potato1_i386.deb
MD5 checksum: ff79ebacf5cfa910608f3cdaff043255

PowerPC architecture:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/slocate_2.4-2potato1_powerpc.deb
MD5 checksum: 1f117700d339fa8acb8de938dab95cfa

Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/main/binary-sparc/slocate_2.4-2potato1_sparc.deb
MD5 checksum: 3059fe27465a9bc8738ea8e7a6f8f3e2

These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- --
- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBOjwcp6jZR/ntlUftAQGl9QL+NCP/27KrPYGJG07HSQzHd37NCIquCeWU
8T9AbeTjDnMynPU3uxR+JUwRyVCzwzMsPeMCChb1TFt2/ERBD2mABwtA8LXeV4L0
jYY4Qeb2A08XmBLrv2iv+BjVZgXE9LPU
=7OcF
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    35 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close