93667 2003-03-11  19:08  /188 rader/  <security@sco.com>
Importerad: 2003-03-11  19:08  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: announce@lists.caldera.com
Extern mottagare: security-alerts@linuxsecurity.com
Externa svar till: please_reply_to_security@sco.com
Mottagare: Bugtraq (import) <3914>
Ärende: Security Update: [CSSA-2003-011.0] Linux: format string vulnerability in zlib (gzprintf)
------------------------------------------------------------
To: bugtraq@securityfocus.com announce@lists.caldera.com security-alerts@linuxsecurity.com


______________________________________________________________________________

			SCO Security Advisory

Subject:		Linux: format string vulnerability in zlib (gzprintf)
Advisory number: 	CSSA-2003-011.0
Issue date: 		2003 March 10
Cross reference:
______________________________________________________________________________


1. Problem Description

	There is a buffer overflow in the gzprintf function in zlib
	that can enable attackers to cause a denial of service or
	possibly execute arbitrary code.


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------

	OpenLinux 3.1.1 Server		prior to libz-1.1.4-2.i386.rpm
					prior to libz-devel-1.1.4-2.i386.rpm
					prior to libz-devel-static-1.1.4-2.i386.rpm

	OpenLinux 3.1.1 Workstation	prior to libz-1.1.4-2.i386.rpm
					prior to libz-devel-1.1.4-2.i386.rpm
					prior to libz-devel-static-1.1.4-2.i386.rpm

	OpenLinux 3.1 Server		prior to libz-1.1.4-2.i386.rpm
					prior to libz-devel-1.1.4-2.i386.rpm
					prior to libz-devel-static-1.1.4-2.i386.rpm

	OpenLinux 3.1 Workstation	prior to libz-1.1.4-2.i386.rpm
					prior to libz-devel-1.1.4-2.i386.rpm
					prior to libz-devel-static-1.1.4-2.i386.rpm


3. Solution

	The proper solution is to install the latest packages. Many
	customers find it easier to use the Caldera System Updater,
	called cupdate (or kcupdate under the KDE environment), to
	update these packages rather than downloading and installing
	them by hand.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2003-011.0/RPMS

	4.2 Packages

	54e3d653907b2aa8111939d208b1f48b	libz-1.1.4-2.i386.rpm
	7b6103ac070899d33ddc18ec0152c8ad
	libz-devel-1.1.4-2.i386.rpm
	bf687e8997a2c7413f183cf0398a797c
	libz-devel-static-1.1.4-2.i386.rpm

	4.3 Installation

	rpm -Fvh libz-1.1.4-2.i386.rpm
	rpm -Fvh libz-devel-1.1.4-2.i386.rpm
	rpm -Fvh libz-devel-static-1.1.4-2.i386.rpm

	4.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2003-011.0/SRPMS

	4.5 Source Packages

	cb073eedd69f6503fdaaf7a12ed37c10	libz-1.1.4-2.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2003-011.0/RPMS

	5.2 Packages

	80a08ebf1d968f880b8bfeb9a91d9288	libz-1.1.4-2.i386.rpm
	de1a572406aae392822c6b8fd9667c05
	libz-devel-1.1.4-2.i386.rpm
	80f2a2de435d10d2acd957cc07790cf9
	libz-devel-static-1.1.4-2.i386.rpm

	5.3 Installation

	rpm -Fvh libz-1.1.4-2.i386.rpm
	rpm -Fvh libz-devel-1.1.4-2.i386.rpm
	rpm -Fvh libz-devel-static-1.1.4-2.i386.rpm

	5.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2003-011.0/SRPMS

	5.5 Source Packages

	dd564551f59c8675aec4cab15e6108dc	libz-1.1.4-2.src.rpm


6. OpenLinux 3.1 Server

	6.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2003-011.0/RPMS

	6.2 Packages

	5cc16bd91015ce00f468e747a5fc8772	libz-1.1.4-2.i386.rpm
	1d321ea1297616096fb5e1a3b72ec828
	libz-devel-1.1.4-2.i386.rpm
	021368dbf124ba856d46fb85f072b010
	libz-devel-static-1.1.4-2.i386.rpm

	6.3 Installation

	rpm -Fvh libz-1.1.4-2.i386.rpm
	rpm -Fvh libz-devel-1.1.4-2.i386.rpm
	rpm -Fvh libz-devel-static-1.1.4-2.i386.rpm

	6.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2003-011.0/SRPMS

	6.5 Source Packages

	9707abacf6336b2d5cb62529a0021d97	libz-1.1.4-2.src.rpm


7. OpenLinux 3.1 Workstation

	7.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2003-011.0/RPMS

	7.2 Packages

	303370a239df4fdff20a93ec885ef342	libz-1.1.4-2.i386.rpm
	ff34cf793e2c8c70627ecd29c271dcca
	libz-devel-1.1.4-2.i386.rpm
	eaef0a84c34dd17b2af72f9e235803da
	libz-devel-static-1.1.4-2.i386.rpm

	7.3 Installation

	rpm -Fvh libz-1.1.4-2.i386.rpm
	rpm -Fvh libz-devel-1.1.4-2.i386.rpm
	rpm -Fvh libz-devel-static-1.1.4-2.i386.rpm

	7.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2003-011.0/SRPMS

	7.5 Source Packages

	c0c9de8ce6e7d254a640b2a84e5d806d	libz-1.1.4-2.src.rpm


8. References

	Specific references for this advisory:

		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0107

	SCO security resources:

		http://www.sco.com/support/security/index.html

	This security fix closes SCO incidents sr875410, fz527488,
	erg712251.


9. Disclaimer

	SCO is not responsible for the misuse of any of the
	information we provide on this website and/or through our
	security advisories. Our advisories are a service to our
	customers intended to promote secure installation and use of
	SCO products.


10. Acknowledgements

	Richard Kettlewell <rjk@greenend.org.uk> discovered and
	researched this vulnerability.

______________________________________________________________________________
(93667) / <security@sco.com>/-------------(Ombruten)
Bilaga (application/pgp-signature) i text 93668
93668 2003-03-11  19:08  /9 rader/  <security@sco.com>
Importerad: 2003-03-11  19:08  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: announce@lists.caldera.com
Extern mottagare: security-alerts@linuxsecurity.com
Externa svar till: please_reply_to_security@sco.com
Mottagare: Bugtraq (import) <3915>
Bilaga (text/plain) till text 93667
Ärende: Bilaga till: Security Update: [CSSA-2003-011.0] Linux: format string vulnerability in zlib (gzprintf)
------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAj5s7SkACgkQbluZssSXDTH4OQCggZEabAzERbaAyH/Rw1t/iIXE
Py4An0e7NFxAWBw5CIujjLeLmYN1PQkL
=wR75
-----END PGP SIGNATURE-----
(93668) / <security@sco.com>/-----------------------