SCIENTIFIC-LINUX-ERRATA Archives

September 2007

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Wed, 19 Sep 2007 16:46:34 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (25 lines)
Synopsis:	Important: nfs-utils-lib security update
Issue date:	2007-09-19
CVE Names:	CVE-2007-3999

Tenable Network Security discovered a stack buffer overflow flaw in the RPC
library used by nfs-utils-lib. A remote unauthenticated attacker who can
access an application linked against nfs-utils-lib could trigger this flaw
and cause the application to crash. On Red Hat Enterprise Linux 4 it is not
possible to exploit this flaw to run arbitrary code as the overflow is
blocked by FORTIFY_SOURCE. (CVE-2007-3999)

SL 4.x

   SRPMS:
nfs-utils-lib-1.0.6-8.z1.src.rpm
   i386:
nfs-utils-lib-1.0.6-8.z1.i386.rpm
nfs-utils-lib-devel-1.0.6-8.z1.i386.rpm
   x86_64:
nfs-utils-lib-1.0.6-8.z1.x86_64.rpm
nfs-utils-lib-devel-1.0.6-8.z1.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2