-----BEGIN PGP SIGNED MESSAGE----- ______________________________________________________________________________ Caldera Systems, Inc. Security Advisory Subject: buffer overflow in amd Advisory number: CSSA-1999:024.0 Issue date: 1999 August, 27 Last revised: 1999 September, 6 Cross reference: ______________________________________________________________________________ 1. Problem Description There is a buffer overflow in AMD, the automounter daemon. It can be exploited by a remote attacker to obtain super user privilege on the attacked host. 2. Vulnerable Versions Systems : COL 2.2 Packages: am-utils-6.0-7 3. Solutions Workaround: none The proper solution is to upgrade to the latest packages rpm -U am-utils-6.0-7.i386.rpm 4. Location of Fixed Packages The upgrade packages can be found on Caldera's FTP site at: ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.3/current/RPMS/ The corresponding source code package can be found at: ftp://ftp.calderaystems.com/pub/OpenLinux/updates/2.3/current/SRPMS 5. Installing Fixed Packages Upgrade the affected packages with the following commands: rpm -U am-utils-6.0-7.i386.rpm 6. Verification 9f60c7a0175ae288c821e4a4493ad9c9 RPMS/am-utils-6.0-7.i386.rpm 94094e382d5ce609146d1e155cb87e3f SRPMS/am-utils-6.0-7.src.rpm 7. References This and other Caldera security resources are located at: http://www.calderasystems.com/news/security/index.html This security fix closes Caldera's internal Problem Report 5093 8. Disclaimer Caldera Systems, Inc. is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of Caldera OpenLinux. ______________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBN9PPJ+n+9R4958LpAQGbhQQAtLc6KWb0Gy4AhkkX6dC6hRTqYOGwk9kG MNUhCbF6S0WA2gxYo0JIWP7VZz3nmY3PJG2yoOYhrkbI6cSZThALaDxB29oWKlLo W2toIPb+nou59XTqrEsEJRcXaUh2eqBjH/YG7QnGlJNCYODGgNnvNL+KApk3Ccy1 mnkSbkeUylI= =xpAz -----END PGP SIGNATURE-----