[18228] in bugtraq
Trustix Security Advisory - stunnel
daemon@ATHENA.MIT.EDU (Trustix Secure Linux Team)
Wed Dec 20 16:56:59 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id: <03ofy863n2.fsf@colargol.tihlde.hist.no>
Date: Tue, 19 Dec 2000 12:40:01 +0100
Reply-To: Trustix Secure Linux Team <tsl@TRUSTIX.COM>
From: Trustix Secure Linux Team <tsl@TRUSTIX.COM>
X-To: tsl-announce@trustix.com
To: BUGTRAQ@SECURITYFOCUS.COM
Hi
Following the advisory on bugtraq concerning a hole in stunnel, Trustix
has released a patched version of this package.
The hole is a plain old "format bug in wrongly written syslog() call",
which could probably yield remote root under the right circumstances.
All versions of Trustix Secure Linux are vulnerable provided that the
server is actually configured to use stunnel. This means that a default
install of the system will technically not be vulnerable, but we suggest
that our users follow security updates regardless of what is actually
run today.
MD5sum:
a041597b699e18cb760d5b37bb6930eb 1.2/RPMS/stunnel-3.8p4-2tr.i586.rpm
d44db0c9424bc396cd77689f50bcada2 1.1/RPMS/stunnel-3.8p4-2tr.i586.rpm
Users of v1.0x should as usual use the update built for v1.1.
Get the updates here:
ftp://ftp.trustix.net/pub/Trustix/updates/
http://www.trustix.net/pub/Trustix/updates/
For version 1.2, the distribution tree and the iso images have been
updated on our sites, and will be available on mirrors shortly. The
build date of the iso images is 20001219.
--
Trustix Security Advisory Board