Executive Summary
Summary | |
---|---|
Title | New mtr packages fix execution of arbitrary code |
Informations | |||
---|---|---|---|
Name | DSA-1587 | First vendor Publication | 2008-05-26 |
Vendor | Debian | Last vendor Modification | 2008-05-26 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Adam Zabrocki discovered that under certain circumstances mtr, a full screen ncurses and X11 traceroute tool, could be tricked into executing arbitrary code via overly long reverse DNS records. For the stable distribution (etch), this problem has been fixed in version 0.71-2etch1. For the unstable distribution (sid), this problem has been fixed in version 0.73-1. We recommend that you upgrade your mtr package. |
Original Source
Url : http://www.debian.org/security/2008/dsa-1587 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20385 | |||
Oval ID: | oval:org.mitre.oval:def:20385 | ||
Title: | DSA-1587-1 mtr - execution of arbitrary code | ||
Description: | Adam Zabrocki discovered that under certain circumstances mtr, a full screen ncurses and X11 traceroute tool, could be tricked into executing arbitrary code via overly long reverse DNS records. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1587-1 CVE-2008-2357 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | mtr |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7244 | |||
Oval ID: | oval:org.mitre.oval:def:7244 | ||
Title: | DSA-1587 mtr -- buffer overflow | ||
Description: | Adam Zabrocki discovered that under certain circumstances mtr, a full screen ncurses and X11 traceroute tool, could be tricked into executing arbitrary code via overly long reverse DNS records. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1587 CVE-2008-2357 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | mtr |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-13 | Name : SLES10: Security update for mtr File : nvt/sles10_mtr.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200806-01 (mtr) File : nvt/glsa_200806_01.nasl |
2008-05-27 | Name : Debian Security Advisory DSA 1587-1 (mtr) File : nvt/deb_1587_1.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2008-210-06 mtr File : nvt/esoft_slk_ssa_2008_210_06.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
45350 | Mtr split.c split_redraw() Function Resolved Hostname Handling Remote Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-07-29 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2008-210-06.nasl - Type : ACT_GATHER_INFO |
2008-07-02 | Name : The remote openSUSE host is missing a security update. File : suse_mtr-5289.nasl - Type : ACT_GATHER_INFO |
2008-07-02 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_mtr-5291.nasl - Type : ACT_GATHER_INFO |
2008-06-04 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200806-01.nasl - Type : ACT_GATHER_INFO |
2008-05-28 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1587.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:27:41 |
|