Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51549
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2002:535
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory CLA-2002:535.

The GNU C Library (glibc) is the standard library used by almost any
program in a common GNU/Linux system.

This announcement addresses four security vulnerabilities in glibc
and also fixes the Brazilian timezone regarding the daylight saving
time.

Vulnerabilities:

1. XDR integer overflow [2][3]
There is an integer overflow in the xdr_array() function derived from
Sun's XDR library. This overflow can lead to memory being allocated
with the wrong size, which will most likely cause buffer overflows
later on depending on how applications use the allocated memory. The
krb5 package also contains the vulnerable code and was already fixed
in a previous announcement[10].

2. Resolver read buffer overflow[4][5]
There is a vulnerability in the way the resolver res_* script_family( of
functions contained in glibc and other BIND derived code are commonly
used. These functions place their answer in a caller-supplied buffer.
If this buffer is too small, the answer is truncated and the caller
can check what the actual size should be by reading the return value
of the function. Some callers, though, incorrectly take this value as
the size of the buffer and may then read beyond its end, eventually
causing a segmentation fault or some other kind of error.
Thanks to Olaf Kirch for sharing a patch to fix this problem.

3. calloc(3) integer overflow[6]
calloc(3) is vulnerable to an integer overflow when multiplying the
number of elements by the size of each element. This operation was
not being verified and could result in less memory than needed to be
allocated. Subsequent uses of this buffer would most likely result in
buffer overflows.

4. Possible information leak[7]
Dmitry V. Levin spotted a possible information leak with undersized
DNS responses, for which Solar Designer created a patch.


Daylight saving time (summer time) update

On Octover 1st, 2002 the dates when daylight saving time will begin
and end have finally been published[8] (a little more than 30 days of
advance notice). These dates have been inserted in glibc's zoneinfo
data.

Historicaly the dates on which the daylight saving time starts and
ends have always been choosen from year to year and are seldom the
same. The National Observatory is conducting a poll[9] about this and
we ask our users to take that poll and also manifest their opinion
about the randomness with which these dates seem to be choosen. With
luck, this kind of update will no longer be necessary in the future.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515&idioma=en
http://www.securityspace.com/smysecure/catid.html?in=CLA-2002:535
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002002

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2002-0391
AIX APAR: IY34194
http://archives.neohapsis.com/archives/aix/2002-q4/0002.html
BugTraq ID: 5356
http://www.securityfocus.com/bid/5356
Bugtraq: 20020731 Remote Buffer Overflow Vulnerability in Sun RPC (Google Search)
http://marc.info/?l=bugtraq&m=102813809232532&w=2
Bugtraq: 20020801 RPC analysis (Google Search)
http://marc.info/?l=bugtraq&m=102821785316087&w=2
Bugtraq: 20020802 MITKRB5-SA-2002-001: Remote root vulnerability in MIT krb5 admin (Google Search)
http://marc.info/?l=bugtraq&m=102831443208382&w=2
Bugtraq: 20020802 kerberos rpc xdr_array (Google Search)
http://online.securityfocus.com/archive/1/285740
Bugtraq: 20020803 OpenAFS Security Advisory 2002-001: Remote root vulnerability in OpenAFS servers (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html
Bugtraq: 20020909 GLSA: glibc (Google Search)
http://marc.info/?l=bugtraq&m=103158632831416&w=2
Caldera Security Advisory: CSSA-2002-055.0
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt
http://www.cert.org/advisories/CA-2002-25.html
CERT/CC vulnerability note: VU#192995
http://www.kb.cert.org/vuls/id/192995
Conectiva Linux advisory: CLA-2002:515
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515
Conectiva Linux advisory: CLA-2002:535
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535
Debian Security Information: DSA-142 (Google Search)
http://www.debian.org/security/2002/dsa-142
Debian Security Information: DSA-143 (Google Search)
http://www.debian.org/security/2002/dsa-143
Debian Security Information: DSA-146 (Google Search)
http://www.debian.org/security/2002/dsa-146
Debian Security Information: DSA-149 (Google Search)
http://www.debian.org/security/2002/dsa-149
Debian Security Information: DSA-333 (Google Search)
http://www.debian.org/security/2003/dsa-333
En Garde Linux Advisory: ESA-20021003-021
http://www.linuxsecurity.com/advisories/other_advisory-2399.html
FreeBSD Security Advisory: FreeBSD-SA-02:42
http://marc.info/?l=bugtraq&m=102821928418261&w=2
HPdes Security Advisory: HPSBTL0208-061
http://online.securityfocus.com/advisories/4402
HPdes Security Advisory: HPSBUX0209-215
http://archives.neohapsis.com/archives/hp/2002-q3/0077.html
ISS Security Advisory: 20020731 Remote Buffer Overflow Vulnerability in Sun RPC
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057
Microsoft Security Bulletin: MS02-057
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057
NETBSD Security Advisory: NetBSD-SA2002-011
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9
RedHat Security Advisories: RHSA-2002:166
http://rhn.redhat.com/errata/RHSA-2002-166.html
http://www.redhat.com/support/errata/RHSA-2002-167.html
RedHat Security Advisories: RHSA-2002:172
http://rhn.redhat.com/errata/RHSA-2002-172.html
http://www.redhat.com/support/errata/RHSA-2002-173.html
http://www.redhat.com/support/errata/RHSA-2003-168.html
http://www.redhat.com/support/errata/RHSA-2003-212.html
SGI Security Advisory: 20020801-01-A
ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A
SGI Security Advisory: 20020801-01-P
ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P
SuSE Security Announcement: SuSE-SA:2002:031 (Google Search)
http://www.iss.net/security_center/static/9170.php
Common Vulnerability Exposure (CVE) ID: CVE-2002-1146
CERT/CC vulnerability note: VU#738331
http://www.kb.cert.org/vuls/id/738331
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:009
NETBSD Security Advisory: NetBSD-SA2002-015
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-015.txt.asc
http://www.redhat.com/support/errata/RHSA-2002-197.html
http://www.redhat.com/support/errata/RHSA-2002-258.html
http://www.redhat.com/support/errata/RHSA-2003-022.html
http://www.iss.net/security_center/static/10295.php
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.