[23506] in bugtraq
Re: CERT Advisory CA-2001-34 Buffer Overflow in System V Derived Login
daemon@ATHENA.MIT.EDU (Derrick Scholl)
Fri Dec 14 19:19:39 2001
Message-Id: <200112142259.fBEMxp0w109611@jurassic.eng.sun.com>
Date: Fri, 14 Dec 2001 14:59:51 -0800 (PST)
From: Derrick Scholl <Derrick.Scholl@eng.sun.com>
Reply-To: Derrick Scholl <Derrick.Scholl@eng.sun.com>
To: bugtraq@securityfocus.com
MIME-Version: 1.0
Content-Type: TEXT/plain; charset=us-ascii
Content-MD5: 95bRIcjBLb1HkgyHDRMcMA==
Hi Folks,
>
> These patches are now available. The relevant patch numbers are :
>
> 111085-02 SunOS 5.8: /usr/bin/login patch
> 111086-02 SunOS 5.8_x86: /usr/bin/login patch
> 112300-01 SunOS 5.7:: usr/bin/login Patch
> 112301-01 SunOS 5.7_x86:: usr/bin/login Patch
> 105665-04 SunOS 5.6: /usr/bin/login patch
> 105666-04 SunOS 5.6_x86: /usr/bin/login patch
> 106160-02 SunOS 5.5.1: /usr/bin/login patch
> 106161-02 SunOS 5.5.1_x86: /usr/bin/login patch
>
> At this stage these no not appear to be free patches (ie, you need a contract
> to get to them), although I expect this will change.
>
There seems to be a propogation delay between hitting the
contract site and the free security site. I've been told
that they will push to the free side during the next run
sometime this afternoon.
Sun Security Bulletin #00213 is in the process of going out
now.
Derrick Scholl
Sun Security Coordinator