Debian Security Advisory

amd -- Buffer overflow in amd -- update

Date Reported:
18 Oct 1999
Affected Packages:
amd
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 614.
In Mitre's CVE dictionary: CVE-1999-0704.
CERT's vulnerabilities, advisories and incident notes: CA-1999-12.
More information:
The version of amd that was distributed with Debian GNU/Linux 2.1 is vulnerable to a remote exploit. Passing a big directory name to amd's logging code would overflow a buffer which could be exploited. That vulnerability was fixed in version 23.0slink1, see the DSA page on 24 Sep 1999 for amd. However, that fix contained an error which has been corrected in version upl102-23.slink2. Use the information below to get corrected packages.
Fixed in:
Source:
http://security.debian.org/dists/slink/updates/source/amd_upl102-23.slink2.diff.gz
http://security.debian.org/dists/slink/updates/source/amd_upl102-23.slink2.dsc
http://security.debian.org/dists/slink/updates/source/amd_upl102.orig.tar.gz
Alpha:
http://security.debian.org/dists/slink/updates/binary-alpha/amd_upl102-23.slink2_alpha.deb
i386:
http://security.debian.org/dists/slink/updates/binary-i386/amd_upl102-23.slink2_i386.deb
m68k:
http://security.debian.org/dists/slink/updates/binary-m68k/amd_upl102-23.slink2_m68k.deb
sparc:
http://security.debian.org/dists/slink/updates/binary-sparc/amd_upl102-23.slink2_sparc.deb