| From: |
| Mageia Updates <buildsystem-daemon@mageia.org> |
| To: |
| updates-announce@ml.mageia.org |
| Subject: |
| [updates-announce] MGASA-2013-0071: nss-pam-ldapd-0.8.6-3.1.mga2
(2/core) |
| Date: |
| Wed, 27 Feb 2013 22:02:35 +0100 |
| Message-ID: |
| <20130227210235.GA15226@valstar.mageia.org> |
| Archive-link: |
| Article, Thread
|
MGASA-2013-0071
Date: February 27nd, 2013
Affected releases: 2
Media: Core
Description:
Updated nss-pam-ldapd packages fixes the following security
vulnerability:
Garth Mollett discovered that a file descriptor overflow issue in the use
of FD_SET() in nss-pam-ldapd can lead to a stack-based buffer overflow.
An attacker could, under some circumstances, use this flaw to cause a
process that has the NSS or PAM module loaded to crash or potentially
execute arbitrary code.
The issue can be triggered in a network daemon by opening a large number
of connections and forcing a name lookup. This would result in a crash
and possibly remote code execution. This issue may also allow local
privilege escalation if a suid program does name lookups and doesn't
close file descriptors inherited from the parent process
(CVE-2013-0288).
Updated Packages:
i586:
nss-pam-ldapd-0.8.6-3.1.mga2.i586.rpm
nss-pam-ldapd-debug-0.8.6-3.1.mga2.i586.rpm
x86_64:
nss-pam-ldapd-0.8.6-3.1.mga2.x86_64.rpm
nss-pam-ldapd-debug-0.8.6-3.1.mga2.x86_64.rpm
SRPMS:
nss-pam-ldapd-0.8.6-3.1.mga2.src.rpm
References:
http://arthurdejong.org/nss-pam-ldapd/CVE-2013-0288
https://bugs.mageia.org/show_bug.cgi?id=9113
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...
(
Log in to post comments)