-----BEGIN PGP SIGNED MESSAGE----- Subject: Caldera Security Advisory SA-1997.14: Vulnerability in "db" library Caldera Security Advisory SA-1997.14 Original report date: 08-Jul-1997 RPM build date: 09-Jul-1997 Original issue date: 03-Sep-1997 Topic: Vulnerability in the "db" library I. Problem Description Package db-1.85.4 contains the Berkeley Database Package (DB) which is a programmatic toolkit to provide database support for applications. This package uses incomplete implementations of the snprintf() and vsnprintf() functions in such a manner to make applications that use the "db" library vulnerable to stack overrun exploits. II. Impact Required libraries are to be updated to alleviate potential security problems. Various applications using the (DB) package are susceptible to stack overrun exploits. The following Caldera releases are affected: Base 1.0 Base 1.1 Lite 1.1 Standard 1.1 Those who use one of the above releases may verify if they are affected by running the following: rpm -q db If version "db-1.85.4-2" (or older) is installed, a fix is required. III. Solution There are both a temporary and permanent fix. The temporary fix applies to those that are not connected to the Internet or WILL NEVER connect to the Internet. cd /user/lib test -w libdb.a && ar ds libdb.a snprintf.o vsnprintf.o SO=libdb.so.1.85.4 objcopy -v -N snprintf -N vsnprintf $SO $SO-new chmod 755 $SO-new && /sbin/ldconfig The permanent fix will update your current db package. One would update by running the following: rpm -U RPMS/db-1.85.4-3.i386.rpm rpm -q db-devel && rpm -U RPMS/db-devel-1.85.4-3.i386.rpm These updates are on Caldera's FTP server (ftp://ftp.caldera.com): /pub/openlinux/updates/1.1/current/RPMS/ for the binaries. /pub/openlinux/updates/1.1/current/SRPMS/ for the sources. The MD5 checksums (from the "md5sum" command) for these packages are: 72297de7ee245405eac15596afb0dc28 RPMS/db-1.85.4-3.i386.rpm dc35c982d3c017f46a9ac6efe93513e0 RPMS/db-devel-1.85.4-3.i386.rpm 694c42ca0984a58dbfd2ce44478770b1 SRPMS/db-1.85.4-3.src.rpm IV. References Security problem around snprintf() as announced to the "linux-security" email list by Thomas Roessler on Tue, 8 Jul 1997 21:33:55 +0200. Message ID: <19970708213355.43189@sobolev.rhein.de>. This and other Caldera security resources are located at: http://www.caldera.com/tech-ref/security/ This advisory closes Caldera's internal bug report #856 V. PGP Signature This message was signed with the PGP key for . This key can be obtained from: ftp://ftp.caldera.com/pub/pgp-keys/ Or on an OpenLinux CDROM under: /OpenLinux/pgp-keys/ $Id: SA-1997.14,v 1.2 1997/09/03 18:38:53 ron Exp $ -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv iQCVAwUBNA2vNen+9R4958LpAQFAaQQAuuxkPLGovW/oxZLd3AaQ2q3U+YaNOZnP +Zu2rqPO/TlSdh15WwEVIy35v48HDa0Bw8EAGZxW7Ng4suc8HlFdqLJm5NQZ5WE/ 2XQQyZO4sBjAUj5Z/E8b93E3xgwcxUTlL3/7xYy7KjFQcR3Ny9kd9cSSvDi+R698 tcaOxCGniTM= =JPO9 -----END PGP SIGNATURE-----