Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51470
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2003:762
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory CLA-2003:762.

The GNU C Library (glibc)[1] is the standard library used by almost
any program in a common GNU/Linux system.

This glibc update includes the fix for a local vulnerability and new
timezone maps adjusted for the brazilian daylight saving time
2003/2004 schedule:

- Local vulnerability in the getgrouplist() function.
There is a buffer overflow in the getgrouplist() which can be
triggered when an user belongs to a number of groups larger than the
one expected by the application. The consequences of the exploitation
of this vulnerability vary accordingly to the application being
exploited and the scenario where it is running. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2003-0689 to this issue[2].

- Brazilian daylight saving time (summer time) update.
On September 24th, 2003 the dates when daylight saving time will
begin and end have finally been published[3] (less than 30 days of
advance notice). These dates have been inserted in the zoneinfo data
of glibc. Historically the dates on which the daylight saving time
starts and ends have always been chosen from year to year and are
seldom the same.

The packages for Conectiva Linux 9 include the latest stable version
of glibc (2.3.2), which includes several bugfixes and enhancements
when compared to the originally distributed version (2.3.1). The
details of these changes can be obtained in the project page[4].

Conectiva Linux 7.0 is not subject to the getgroupslist()
vulnerability and will have a separate update for the daylight saving
time issue available in our updates page[5].


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.gnu.org/software/libc/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0689
http://www.gnu.org/software/libc/#CurrentStatus
http://distro.conectiva.com.br/atualizacoes/index.php?id=d&distro=000014
http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:762
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0689
http://www.redhat.com/support/errata/RHSA-2003-249.html
http://www.redhat.com/support/errata/RHSA-2003-325.html
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.