- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200403-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Buffer overflow in Midnight Commander Date: March 29, 2004 Bugs: #45957 ID: 200403-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A remotely-exploitable buffer overflow in Midnight Commander allows arbitrary code to be run on a user's computer Background ========== Midnight Commander is a visual file manager. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- app-misc/mc <= 4.6.0-r4 >= 4.6.0-r5 Description =========== A stack-based buffer overflow has been found in Midnight Commander's virtual filesystem. Impact ====== This overflow allows an attacker to run arbitrary code on the user's computer during the symlink conversion process. Workaround ========== While a workaround is not currently known for this issue, all users are advised to upgrade to the latest version of the affected package. Resolution ========== All users should upgrade to the current version of the affected package: # emerge sync # emerge -pv ">=app-misc/mc-4.6.0-r5" # emerge ">=app-misc/mc-4.6.0-r5" References ========== [ 1 ] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1023 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@xxxxxxxxxx or alternatively, you may file a bug at http://bugs.gentoo.org.
Attachment:
pgpvjUfueW3ow.pgp
Description: PGP signature