Bug 10338 - man overflow exploit.
Summary: man overflow exploit.
Keywords:
Status: CLOSED DUPLICATE of bug 9892
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: man
Version: 6.1
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Bernhard Rosenkraenzer
QA Contact:
URL: http://securityfocus.com/data/vulnera...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2000-03-25 02:19 UTC by zurk
Modified: 2008-05-01 15:37 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2000-03-25 02:36:03 UTC
Embargoed:


Attachments (Terms of Use)

Description zurk 2000-03-25 02:19:33 UTC
A buffer overflow exists in the implementation of the 'man' program
 shipped with RedHat Linux, and other LInux vendors. By carefully
 crafting a long buffer of machine executable code, and placing it in the
 MANPATH environmental variable, it becomes possible for a would be
 attacker to gain egid man.

Comment 1 Bernhard Rosenkraenzer 2000-03-25 02:36:59 UTC
This has been reported and fixed a couple of months ago.
We didn't release an errata package because it is non-critical; at the very
worst, someone getting gid man can present false man pages to users who access
the previously generated man page cache instead of rebuilding the man pages.

*** This bug has been marked as a duplicate of 9892 ***


Note You need to log in before you can comment on or make changes to this bug.