Debian Security Advisory
splitvt -- root exploit in splitvt
- Date Reported:
- 05 Jun 2000
- Affected Packages:
-
splitvt
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2000-0467.
- More information:
- The version of splitvt distributed in Debian GNU/Linux 2.1
(a.k.a. slink), as well as in the frozen (potato) and unstable (woody)
distributions, is vulnerable to a local buffer overflow. This could be
exploited to give a shell running as root. This has been fixed in versions
1.6.3-7.0slink1 (for slink) and 1.6.3-7.1 (for potato), and we recommend that
you update your splitvt package immediately.
- Fixed in:
-
- Source:
- http://security.debian.org/dists/slink/updates/source/splitvt_1.6.3-7.0slink1.diff.gz
- http://security.debian.org/dists/slink/updates/source/splitvt_1.6.3-7.0slink1.dsc
- http://security.debian.org/dists/slink/updates/source/splitvt_1.6.3.orig.tar.g
- alpha:
- http://security.debian.org/dists/slink/updates/binary-alpha/splitvt_1.6.3-7.0slink1_alpha.deb
- i386:
- http://security.debian.org/dists/slink/updates/binary-i386/splitvt_1.6.3-7.0slink1_i386.deb
- m68k:
- http://security.debian.org/dists/slink/updates/binary-m68k/splitvt_1.6.3-7.0slink1_m68k.deb
- sparc:
- http://security.debian.org/dists/slink/updates/binary-sparc/splitvt_1.6.3-7.0slink1_sparc.deb