Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » Mandrake 200305-11: Maelstrom buffer overflow

Mandrake 200305-11: Maelstrom buffer overflow

by Nikola Strahija on May 30th, 2003 A local buffer overflow exists in maelstrom which, if exploited, allows local attackers to issue arbitrary code.


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200305-11
- - - ---------------------------------------------------------------------

PACKAGE : maelstrom
SUMMARY : buffer overflow
DATE : 2003-05-30 13:07 UTC
EXPLOIT : local
VERSIONS AFFECTED : FIXED VERSION : >=maelstrom-3.0.6
CVE : CAN-2003-0325

- - - ---------------------------------------------------------------------

A local buffer overflow exists in maelstrom.

Read the full advisory at
http://marc.theaimsgroup.com/?l=bugtraq&m=105337792703887&w=2

SOLUTION

It is recommended that all Gentoo Linux users who are running
app-games/maelstrom upgrade to maelstrom-3.0.6 as follows

emerge sync
emerge maelstrom
emerge clean

- - - ---------------------------------------------------------------------
[email protected] - GnuPG key is available at http://cvs.gentoo.org/~aliz
- - - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE+11eYfT7nyhUpoZMRAk1QAKCPBtBxyjyCj+FJc9h/SG4pPfiEBQCdFGu4
k/ougSLhKUKE8cUqfbnniq4=
=5yhY
-----END PGP SIGNATURE-----


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »