Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVSA-2008:176 ] mtr

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1219266613-11275-8313

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Security Advisory MDVSA-2008:176

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : mtr

Date : August 20, 2008

Affected: Corporate 4.0

_______________________________________________________________________

 

Problem Description:

 

A stack-based buffer overflow was found in mtr prior to version 0.73

that allowed remote attackers to execute arbitrary code via a crafted

DNS PTR record, when called with the --split option (CVE-2008-2357).

 

The updated packages provide mtr 0.73 which corrects this issue.

_______________________________________________________________________

 

References:

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2357

_______________________________________________________________________

 

Updated Packages:

 

Corporate 4.0:

c98d0d2dd309c5e2c682f9856fc4a3f4 corporate/4.0/i586/mtr-0.73-0.1.20060mlcs4.i586.rpm

30ec5571b686d8cca39b298ce4e2bf85 corporate/4.0/i586/mtr-gtk-0.73-0.1.20060mlcs4.i586.rpm

b7167d193a2deb8fdd9b95d3bcaf4675 corporate/4.0/SRPMS/mtr-0.73-0.1.20060mlcs4.src.rpm

 

Corporate 4.0/X86_64:

740038eccdac13acd2bedb4469ecbbfc corporate/4.0/x86_64/mtr-0.73-0.1.20060mlcs4.x86_64.rpm

402ab38bff420a063010b88593e0fc5f corporate/4.0/x86_64/mtr-gtk-0.73-0.1.20060mlcs4.x86_64.rpm

b7167d193a2deb8fdd9b95d3bcaf4675 corporate/4.0/SRPMS/mtr-0.73-0.1.20060mlcs4.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFIrF2xmqjQ0CJFipgRAoN9AKDswTeqPU5xaFFInlBddSlMK2etlwCfeqOx

gRxEkoZdoJ/un1RQL037zLQ=

=mQNB

-----END PGP SIGNATURE-----

 

 

------------=_1219266613-11275-8313

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1219266613-11275-8313--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×