Thanks for testing, Christian. Debian and Mandrake have released fixes for it. However Debian suid's their screen binary, so they have a much higher risk with this bug. I'm not sure about mandrake. -jason On Wed, Jan 07, 2004 at 01:50:00PM +0000, Christian Pearce wrote: > I compiled it for 7.2. It seems to work fine. I updated the bug. > > https://bugzilla.fedora.us/show_bug.cgi?id=1187 > > I am not certain if we should choose to release this as a security fix. Certainly if RedHat does for 9 we should. If other distributions do we should as well. Since we did the work at this point we should. > > -- > Christian Pearce > http://www.commnav.com > > > > rohwedde@xxxxxxxxxxxxxxx (Jason) said: > > > > > > Currently entered into the bugzilla at: > > https://bugzilla.fedora.us/show_bug.cgi?id=1187 > > > > I'm curious whether the community thinks this is a necessary patch? > > Thanks. > > > > -jason > > > > --------------------------------------------------------------------- > > > > Patched SRPMS for screen buffer overflow > > > > Details at: > > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0972 > > http://marc.theaimsgroup.com/?l=bugtraq&m=106995837813873&w=2 > > > > RH 7.3 https://mail.codegrinder.com/www/screen-3.9.11-4.legacy.src.rpm > > RH 7.2 https://mail.codegrinder.com/www/screen-3.9.9-4.legacy.src.rpm > > MD5SUM https://mail.codegrinder.com/www/screen-md5sums.asc > > > > The 7.3 rpms work for me.. I don't have a 7.2 box available to test that > > one. > > > > The default in 7.3 is to not suid the screen binary, so I think we're > > safe from privilege escalation (unless the user does it of their own > > volition). But, I am a bit concerned with the idea that someone could > > hijack my screen session. So, is this a patch we want to push? If so, > > we should patch the RH8 rpms as well. RH hasn't yet released a patch > > for 9, though it has a vulnerable version. > > > > > > > -- > > fedora-legacy-list@xxxxxxxxxx > http://www.redhat.com/mailman/listinfo/fedora-legacy-list
Attachment:
pgp00155.pgp
Description: PGP signature