[LWN Logo]

Date: 29 Aug 1999 00:44:42 -0000
From: listmaster@locutus.calderasystems.com
To: announce@lists.calderasystems.com
Subject: Security Advisory 24

-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________
		   Caldera Systems, Inc.  Security Advisory

Subject:		buffer overflow in amd
Advisory number: 	CSSA-1999:024.0
Issue date: 		1999 August, 27
Cross reference:
______________________________________________________________________________


1. Problem Description

   There is a buffer overflow in AMD, the automounter daemon.
   It can be exploited by a remote attacker to obtain super
   user privilege on the attacked host.

2. Vulnerable Versions

   Systems : COL 2.2
   Packages: am-utils-6.0-7

3. Solutions

   Workaround: none

   The proper solution is to upgrade to the latest packages

	rpm -U am-utils-6.0-7.i386.rpm
	
4. Location of Fixed Packages

   The upgrade packages can be found on Caldera's FTP site at:

   ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.2/current/RPMS/

   The corresponding source code package can be found at:

   ftp://ftp.calderaystems.com/pub/OpenLinux/updates/2.2/current/SRPMS


5. Installing Fixed Packages

   Upgrade the affected packages with the following commands:

        rpm -U am-utils-6.0-7.i386.rpm
	
6. Verification

   9f60c7a0175ae288c821e4a4493ad9c9  RPMS/am-utils-6.0-7.i386.rpm
   94094e382d5ce609146d1e155cb87e3f  SRPMS/am-utils-6.0-7.src.rpm

7. References

   This and other Caldera security resources are located at:

   http://www.calderasystems.com/news/security/index.html

   This security fix closes Caldera's internal Problem Report 5093

8. Disclaimer
   Caldera Systems, Inc. is not responsible for the misuse of any of the
   information we provide on this website and/or through our security
   advisories. Our advisories are a service to our customers intended to
   promote secure installation and use of Caldera OpenLinux.

______________________________________________________________________________


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBN8a+JOn+9R4958LpAQGlOgP+OhRnkGULFNId5vZRqN/BaW2Keaim6NIi
mNUcq33WRejF9FA2RvtmNrFNjufLiAu7pvqHoW5PA33ZI1yIrSrMHfLnDxFevmJk
bDkETNcIGpkm3xkPHbRAyBmHEdzz/812SV/mneFCS+lH7SBrkRN0gh1MKqgtiwy+
83AYxdxDYvU=
=7mRD
-----END PGP SIGNATURE-----
 --
Note: To learn how to use this list server, email a "help" command to
majordomo@lists.calderasystems.com.