Red Hat alert: New ncurses packages fixing buffer overrun available

Posted by dave on Nov 27, 2000 10:46 AM EDT
Mailing list
Mail this story
Print this story

If you are any setuid applications that use ncurses and its cursor movement functionality, local users may gain access to the program's privileges. 2000-11-27: Added packages for Red Hat Linux 7 for Alpha

---------------------------------------------------------------------
                   Red Hat, Inc. Security Advisory

Synopsis:          New ncurses packages fixing buffer overrun available
Advisory ID:       RHSA-2000:115-02
Issue date:        2000-11-23
Updated on:        2000-11-26
Product:           Red Hat Linux
Keywords:          ncurses buffer overrun exploit setuid
Cross references:  N/A
---------------------------------------------------------------------

1. Topic:

If you are any setuid applications that use ncurses and its cursor movement

functionality, local users may gain access to the program's privileges.



2000-11-27: Added packages for Red Hat Linux 7 for Alpha

2. Relevant releases/architectures:

Red Hat Linux 6.2 - i386, alpha, sparc
Red Hat Linux 6.2EE - i386, alpha, sparc
Red Hat Linux 7.0 - i386, alpha

3. Problem description:

There used to be an overflowable buffer in the part of the ncurses library

handling cursor movement.

Attackers can force a privileged application to use their own termcap file

containing a special terminal entry which will trigger the ncurses

vulnerability, allowing them to execute arbitrary code with the privileges

of the exploited binary.

4. Solution:

For each RPM for your particular architecture, run:



rpm -Fvh [filename]



where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

20809 - ncurses allows local privilege escalation


6. RPMs required:

Red Hat Linux 6.2:

alpha:
ftp://updates.redhat.com/6.2/alpha/ncurses-5.0-12.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/ncurses-devel-5.0-12.alpha.rpm

sparc:
ftp://updates.redhat.com/6.2/sparc/ncurses-5.0-12.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/ncurses-devel-5.0-12.sparc.rpm

i386:
ftp://updates.redhat.com/6.2/i386/ncurses-5.0-12.i386.rpm
ftp://updates.redhat.com/6.2/i386/ncurses-devel-5.0-12.i386.rpm

sources:
ftp://updates.redhat.com/6.2/SRPMS/ncurses-5.0-12.src.rpm

Red Hat Linux 7.0:

alpha:
ftp://updates.redhat.com/7.0/alpha/ncurses-5.2-2.alpha.rpm
ftp://updates.redhat.com/7.0/alpha/ncurses-devel-5.2-2.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/i386/ncurses-5.2-2.i386.rpm
ftp://updates.redhat.com/7.0/i386/ncurses-devel-5.2-2.i386.rpm

sources:
ftp://updates.redhat.com/7.0/SRPMS/ncurses-5.2-2.src.rpm

7. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
268df5613b61b146b8cae1c59369c0b7  6.2/SRPMS/ncurses-5.0-12.src.rpm
1decbd07374fd9fb7ae5a12641d2667b  6.2/alpha/ncurses-5.0-12.alpha.rpm
ed52d2bad06cee2cec081bb889a5e363  6.2/alpha/ncurses-devel-5.0-12.alpha.rpm
d401a0317132c114a75dfeefb881f66c  6.2/i386/ncurses-5.0-12.i386.rpm
bc84ee23b1b8f960a0911a5388c52d24  6.2/i386/ncurses-devel-5.0-12.i386.rpm
654eca10b3b44afef783c39da3b254dc  6.2/sparc/ncurses-5.0-12.sparc.rpm
e273dd6e88899781bcc7441e7505de5c  6.2/sparc/ncurses-devel-5.0-12.sparc.rpm
4444a46c15c28db246b191daf4f3dfde  7.0/SRPMS/ncurses-5.2-2.src.rpm
64d008bc67646bc54c3b94b84a0c63fe  7.0/alpha/ncurses-5.2-2.alpha.rpm
b2b05f687584244fd0a33583d7684b25  7.0/alpha/ncurses-devel-5.2-2.alpha.rpm
9affe6c75ae33d616ea695766c10e44e  7.0/i386/ncurses-5.2-2.i386.rpm
a555ec460de5650c4a2c42abc5de838c  7.0/i386/ncurses-devel-5.2-2.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
    rpm --checksig  

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg 

8. References:

N/A


Copyright(c) 2000 Red Hat, Inc.

  Nav
» Read more about: Story Type: Security; Groups: Red Hat

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.