GLSA Administrator
![Administrator Administrator](/images/ranks/rank-admin.gif)
![](images/avatars/3896974784c480ee5977f8.gif)
Joined: 27 Jun 2003 Posts: 4983 Location: Gothenburg, Sweden
|
Posted: Wed Apr 13, 2005 5:50 pm Post subject: [ GLSA 200504-10 ] Gld: Remote execution of arbitrary code |
|
|
Gentoo Linux Security Advisory
Title: Gld: Remote execution of arbitrary code (GLSA 200504-10)
Severity: high
Exploitable: remote
Date: April 13, 2005
Updated: May 22, 2006
Bug(s): #88904
ID: 200504-10
Synopsis
Gld contains several serious vulnerabilities, potentially resulting in the
execution of arbitrary code as the root user.
Background
Gld is a standalone greylisting server for Postfix.
Affected Packages
Package: mail-filter/gld
Vulnerable: <= 1.4
Unaffected: >= 1.5
Architectures: All supported architectures
Description
dong-hun discovered several buffer overflows in server.c, as well as
several format string vulnerabilities in cnf.c.
Impact
An attacker could exploit this vulnerability to execute arbitrary code
with the permissions of the user running Gld, the default user being
root.
Workaround
There is no known workaround at this time.
Resolution
All Gld users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-filter/gld-1.5" |
References
SecurityTracker ID 1013678
CVE-2005-1099
CVE-2005-1100
Last edited by GLSA on Wed Nov 12, 2014 4:19 am; edited 8 times in total |
|