Bug 17571 - XDMCP buffer overflow
Summary: XDMCP buffer overflow
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: gdm   
(Show other bugs)
Version: 7.0
Hardware: i386
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Havoc Pennington
QA Contact:
URL: http://www.securityfocus.com/frames/?...
Whiteboard:
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2000-09-17 09:49 UTC by osi
Modified: 2008-05-01 15:37 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2000-09-17 14:52:26 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

Description osi 2000-09-17 09:49:58 UTC
Hello,

Has the XDMCP buffer overflow bug been fixed for gdm?  According
to the ChangeLog in /usr/share/doc/gdm-2.0beta2 it has not.
The bugtraq id is 1233.

Comment 1 Havoc Pennington 2000-09-17 16:39:14 UTC
The ChangeLog is from upstream, we have several dozen Red Hat patches (see the
spec file).
I believe we have the config option that enables the exploit off by default, and
there is also a security patch related to arrays and XDMCP in our package.
BugTraq shows RH 6.x as not vulnerable.I am pretty confident it's fixed but
Elliot fixed it so CC'ing him in case he wants to reopen the bug.


Note You need to log in before you can comment on or make changes to this bug.