Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » FreeBSD-SA-01:22 Security Advisory

FreeBSD-SA-01:22 Security Advisory

by Phiber on February 8th, 2001 The dc20ctrl port, versions prior to 0.4_1, contains a locally exploitable buffer overflow. Because the dc20ctrl program is also setgid dialer, unprivileged local users may gain gid dialer on the local system. This may allow the users to gain unauthorized access to the serial port devices....

P.S. This is the 100th story posted on Xatrix Security!


The dc20ctrl port is not installed by default, nor is it "part of
FreeBSD" as such: it is part of the FreeBSD ports collection, which
contains over 4500 third-party applications in a ready-to-install
format. The ports collections shipped with FreeBSD 3.5.1 and 4.2
contain this problem since it was discovered after the releases.



FreeBSD makes no claim about the security of these third-party
applications, although an effort is underway to provide a security
audit of the most security-critical ports.

Quick fix:

Upgrade your entire ports collection and rebuild the dc20ctrl port.

(impacts and solutions available in full advisory, so download it! :)

Download this advisory

or

Visit FreeBSD


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »