[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[linux-security] xemacs vulnerability
- To: linux-security
- Subject: [linux-security] xemacs vulnerability
- From: Martin Siegert <siegert@sfu.ca>
- Date: Wed, 14 Mar 2001 17:40:52 -0800
- User-Agent: Mutt/1.2i
Topic
=====
buffer overflow in gnuserv compromises security when running xemacs.
Problem Description
===================
Gnuserv is a remote control facility for Emacsen
which is available as standalone program as well as included in
XEmacs21. Gnuserv has a buffer for which insufficient boundary checks
were made. Unfortunately this buffer affected access control to
gnuserv which is using a MIT-MAGIC-COOCKIE based system. It is
possible to overflow the buffer containing the cookie and disable the
cookie comparison. This could lead into a remote user issue commands under
the UID of the person running gnuserv.
Affected Systems
================
xemacs versions prior to 21.1.14
Workaround
==========
Use emacs.
Solution
========
upgrade to version 21.1.14
Debian 2.2 (potato)
-------------------
upgrade the following packages:
gnuserv_2.1alpha-5.1_i386.deb, xemacs21-bin_21.1.10-5_i386.deb,
emacs21-mule-canna-wnn_21.1.10-5_i386.deb, xemacs21-mule_21.1.10-5_i386.deb,
xemacs21-nomule_21.1.10-5_i386.deb
RedHat 6.x
----------
RedHat 6.x does not have xemacs included, it is available as part of the
powertools packages. If you installed it:
rpm -Fvh xemacs-21.1.14-2.62.i386.rpm xemacs-el-21.1.14-2.62.i386.rpm \
xemacs-info-21.1.14-2.62.i386.rpm
RedHat 7.0
----------
rpm -Fvh xemacs-21.1.14-2.7.i386.rpm xemacs-el-21.1.14-2.7.i386.rpm \
xemacs-info-21.1.14-2.7.i386.rpm
Remark with respect to RedHat 6.x, 7.0:
the new packages obsolete xemacs-mule (this is now compiled into the
main binary), xemacs-static, xemacs-extras and xemacs-noX.