Originally Published: Sunday, 4 June 2000 Author: Alexander Reelsen
Published to: news_enhance_security/Security News Page: 1/1 - [Printable]

Linux Mandrake Security update - cdrecord

The linux cdrecord binary is vulnerable to a locally exploitable buffer overflow attack. This vulnerability can be exploited to execute arbitrary commands with the gid "cdburner".

   Page 1 of 1  

Date: Sat, 03 Jun 2000 18:49:16 +0200 From: Gael Duval To: security-announce@linux-mandrake.com Subject: [Security Announce] cdrecord

-------------------------------------

Linux-Mandrake Security Update

-------------------------------------

Package: cdrecord

Affected versions: 6.1 7.0

Problem: The linux cdrecord binary is vulnerable to a locally exploitable buffer overflow attack. When installed on a Linux-Mandrake distribution, it is by default setgid "cdburner" (which is a group, gid: 80, that is created for the application). The overflow condition is the result of no bounds checking on the 'dev=' argument passed to cdburner at execution time. This vulnerability can be exploited to execute arbitrary commands with the gid "cdburner".

Please upgrade to:

md5sum: 8f4544f8307019230e74717a9b836051 package: 7.0/RPMS/cdrecord-1.8.1-4mdk.i586.rpm

md5sum: 6daec92096f82bfac45a3346cbdc9cdb package: 7.0/RPMS/cdrecord-cdda2wav-1.8.1-4mdk.i586.rpm

md5sum: 7dd8e55e2f2879ed84d7b667a09bc77c package: 7.0/RPMS/cdrecord-devel-1.8.1-4mdk.i586.rpm

md5sum: da6240b73b4238ae554dbf45616319ec package: 7.0/RPMS/mkisofs-1.12.1-4mdk.i586.rpm

md5sum: 624aebaf07615e3f18471d3ff9af4ede source package: 7.0/SRPMS/cdrecord-1.8.1-4mdk.src.rpm

To upgrade automatically, use MandrakeUpdate . If you want to upgrade manually, download the updated package from one of our FTP server mirrors and uprade with "rpm -Uvh package_name". All mirrors are listed on http://www.mandrake.com/en/ftp.php3 Updated packages are available in the "updates/" directory.

For example, if you are looking for an updated RPM package for Mandrake 7.0, look for it in: updates/7.0/RPMS/

Note: we give the md5 sum for each package. It lets you check the integrity of the downloaded package by running the md5sum command on the package ("md5sum package.rpm").





   Page 1 of 1