GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Thu Jul 31, 2008 8:26 pm Post subject: [ GLSA 200807-14 ] Linux Audit: Buffer overflow |
|
|
Gentoo Linux Security Advisory
Title: Linux Audit: Buffer overflow (GLSA 200807-14)
Severity: normal
Exploitable: local
Date: July 31, 2008
Bug(s): #215705
ID: 200807-14
Synopsis
A buffer overflow vulnerability in Linux Audit may allow local attackers to
execute arbitrary code.
Background
Linux Audit is a set of userspace utilities for storing and processing
auditing records.
Affected Packages
Package: sys-process/audit
Vulnerable: < 1.7.3
Unaffected: >= 1.7.3
Architectures: All supported architectures
Description
A stack-based buffer overflow has been reported in the
audit_log_user_command() function in the file lib/audit_logging.c when
processing overly long arguments.
Impact
A local attacker could execute a specially crafted command on the host
running Linux Audit, possibly resulting in the execution of arbitrary
code with the privileges of the user running Linux Audit.
Workaround
There is no known workaround at this time.
Resolution
All Linux Audit users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=sys-process/audit-1.7.3" |
References
CVE-2008-1628
Last edited by GLSA on Wed Jun 12, 2013 4:28 am; edited 4 times in total |
|