Debian alert: slocate local exploit

Posted by dave on Dec 16, 2000 4:53 PM EDT
Mailing list
Mail this story
Print this story

Michel Kaempf reported a security problem in slocate (a secure version of locate, a tool to quickly locate files on a filesystem) on bugtraq which was originally discovered by zorgon. He discovered there was a bug in the database reading code which made it overwrite a internal structure with some input. He then showed this could be exploited to trick slocate into executing arbitrary code by pointing it to a carefully crafted database.

-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory DSA-005-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
December 17, 2000
- ------------------------------------------------------------------------


Package        : slocate
Problem type   : local exploit
Debian-specific: no

Michel Kaempf reported a security problem in slocate (a secure version
of locate, a tool to quickly locate files on a filesystem) on bugtraq
which was originally discovered by zorgon. He discovered there was
a bug in the database reading code which made it overwrite a internal
structure with some input. He then showed this could be exploited
to trick slocate into executing arbitrary code by pointing it to a
carefully crafted database.

This has been fixed in version 2.4-2potato1 and we recommend that you
upgrade your slocate package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/slocate_2.4-2potato1.diff.gz
      MD5 checksum: 9d15a0e95b501427f697e9031d8e62e8
    http://security.debian.org/dists/stable/updates/main/source/slocate_2.4-2potato1.dsc
      MD5 checksum: 7effe675baba70e3b30ce41e9d231835
    http://security.debian.org/dists/stable/updates/main/source/slocate_2.4.orig.tar.gz
      MD5 checksum: 185520e64e7b194b6d448f034e2f1c7a

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/main/binary-alpha/slocate_2.4-2potato1_alpha.deb
      MD5 checksum: 90888e9f21437c6a3e7c7addbd244fdc

  ARM architecture:
    http://security.debian.org/dists/stable/updates/main/binary-arm/slocate_2.4-2potato1_arm.deb
      MD5 checksum: 8904b89a14f7a91f6c205fa37ad67466

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-m68k/slocate_2.4-2potato1_m68k.deb
      MD5 checksum: 09bd79672ac452a5c10618a368a4b40a

  Intel ia32 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-i386/slocate_2.4-2potato1_i386.deb
      MD5 checksum: ff79ebacf5cfa910608f3cdaff043255

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/slocate_2.4-2potato1_powerpc.deb
      MD5 checksum: 1f117700d339fa8acb8de938dab95cfa

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/main/binary-sparc/slocate_2.4-2potato1_sparc.deb
      MD5 checksum: 3059fe27465a9bc8738ea8e7a6f8f3e2

  These files will be moved into
  ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- -- 
- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBOjwcp6jZR/ntlUftAQGl9QL+NCP/27KrPYGJG07HSQzHd37NCIquCeWU
8T9AbeTjDnMynPU3uxR+JUwRyVCzwzMsPeMCChb1TFt2/ERBD2mABwtA8LXeV4L0
jYY4Qeb2A08XmBLrv2iv+BjVZgXE9LPU
=7OcF
-----END PGP SIGNATURE-----


  Nav
» Read more about: Story Type: Security; Groups: Debian

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.