Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

GLSA: openldap
From: Daniel Ahlberg <aliz () gentoo org>
Date: Sat, 28 Dec 2002 01:10:15 +0100

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200212-12
- - --------------------------------------------------------------------

PACKAGE : openldap
SUMMARY : remote command execution
DATE    : 2002-12-28 00:12 UTC
EXPLOIT : remote

- - --------------------------------------------------------------------

- From SuSE Security Advisory SuSE-SA:2002:047:

"The SuSE Security Team reviewed critical parts of that package and 
found several buffer overflows and other bugs remote attackers could 
exploit to gain access on systems running vulnerable LDAP servers.
In addition to these bugs, various local exploitable bugs within the
OpenLDAP2 libraries (openldap2-devel package) have been fixed."

Read the full advisory at
http://www.suse.de/de/security/2002_047_openldap2.html

SOLUTION

It is recommended that all Gentoo Linux users who are running
net-nds/openldap-2.0.25-r2 update their systems as follows:

emerge rsync
emerge openldap
emerge clean

- - --------------------------------------------------------------------
aliz () gentoo org - GnuPG key is available at www.gentoo.org/~aliz
raker () gentoo org
- - --------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+DOvXfT7nyhUpoZMRAosUAJwLfUla5RD/VxF7WHAm8ZAbbFYgmACgugyg
WemCvhFKS9lr6lCJpOS3Nyo=
=Oga0
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  By Date           By Thread  

Current thread:
  • GLSA: openldap Daniel Ahlberg (Dec 28)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault