[22806] in bugtraq

home help back first fref pref prev next nref lref last post

FW: [advisory] SSRT0767u Potential rpc.ttdbserverd buffer overflow

daemon@ATHENA.MIT.EDU (Boren, Rich (SSRT))
Sun Oct 7 03:10:28 2001

content-class: urn:content-classes:message
Date: Sat, 6 Oct 2001 09:47:11 -0600
Message-ID: <LYRIS-10497-30265-2001.10.06-08.45.13--aleph1#securityfocus.com@list.support.compaq.com>
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
From: "Boren, Rich (SSRT)" <Rich.Boren@COMPAQ.com>
To: "Security Patch Mailing List" <security@list.support.compaq.com>
Cc: "Security-SSRT" <Security-SSRT@COMPAQ.com>
Reply-To: "Security Patch Mailing List" <security@list.support.compaq.com>
Content-Type: application/pgp; format=text; x-action=sign
Resent-From: aleph1@securityfocus.com
Resent-To: bugtraq@securityfocus.com

=20
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

    NO RESTRICTION FOR DISTRIBUTION
 PROVIDED THE ADVISORY REMAINS INTACT
=20
  TITLE: SSRT0767U Potential rpc.ttdbserverd buffer overflow

  CASE ID: SSRT0767U
  (X-REF: CVE CAN-2001-0717, x-force 02-oct-2001,=20
          CERT CA-2001-27)=20

  SOURCE:  Compaq Computer Corporation    =20
           Software Security Response Team
    DATE:  02-Oct-2001

(c) Copyright 2001 Compaq Computer Corporation. All rights reserved.


  "Compaq is broadly distributing this Security Advisory in order
  to bring to the attention of users of Compaq products the
  important security information contained in this Advisory.
  Compaq recommends that all users determine the applicability of
  this information to their individual situations and take
  appropriate action.
  =20
  Compaq does not warrant that this information is necessarily
  accurate or complete for all user situations and, consequently,
  Compaq will not be responsible for any damages resulting from
  user's use or disregard of the information provided in this
  Advisory."

  Severity: low
  =20
   This potential security vulnerability has not been
   reproduced for any release of Compaq Tru64 Unix.
   However with the information available, we are providing
   a patch that will further reduce any potential
   vulnerability.
  =20
   A patch has been made available for all supported
   versions of Tru64/ DIGITAL UNIX V4.0f, V4.0g, V5.0a,
   V5.1, and V5.1a. To obtain a patch for prior versions
   contact your normal Compaq Services support channel.
  =20
   *This solution will be included in a future distributed=20
   release of Compaq's Tru64 / DIGITAL UNIX.


  The patches identified are available from the Compaq FTP site
  http://ftp1.support.compaq.com/public/dunix/ then choose the
  version directory needed and search for the patch by name.
  =20
  The patch names are:

     DUV40F17-C0056200-11703-ER-20010928.tar
     T64V40G17-C0007000-11704-ER-20010928.tar
     T64V50A17-C0015500-11705-ER-20010928.tar
     T64V5117-C0065200-11706-ER-20010928.tar
     T64V51Assb-C0000800-11707-ER-20010928.tar


  To subscribe to automatically receive future NEW Security=20
  Advisories from the Software Security Response Team at=20
  Compaq via electronic mail,=20

  Use your browser to get to the=20
  http://www.support.compaq.com/patches/mailing-list.shtml=20
  and sign up.   Select "Security and Individual Notices" for
  immediate dispatch notifications.

  To report a potential security vulnerability for Compaq
  products, send email to security-ssrt@compaq.com=20

  If you need further information, please contact your normal=20
  Compaq Services support channel.

  Compaq appreciates your cooperation and patience. As always,=20
  Compaq urges you to periodically review your system management=20
  and security procedures.  Compaq will continue to review and=20
  enhance the security features of its products and work
  with customers to maintain and improve the security and=20
  integrity of their systems.

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.1

iQA/AwUBO78nlDnTu2ckvbFuEQKetQCg4wWYlBghvodt3FcggpMWzoYYQNIAoOBu
59ftYye4zJnazHWnZHQqEPBY
=3DJKbN
-----END PGP SIGNATURE-----


---
You are currently subscribed to security as: aleph1@securityfocus.com
To unsubscribe send a blank email to leave-security-10497E@list.support.compaq.com

home help back first fref pref prev next nref lref last post