- Issued:
- 2003-02-11
- Updated:
- 2003-02-07
RHSA-2003:008 - Security Advisory
Synopsis
mgetty security update
Type/Severity
Security Advisory: Low
Topic
Updated Mgetty packages are now available to fix a possible buffer overflow
and a permissions problem.
Description
Mgetty is a getty replacement for use with data and fax modems.
Mgetty can be configured to run an external program to decide whether or
not to answer an incoming call based on Caller ID information. Versions of
Mgetty prior to 1.1.29 would overflow an internal buffer if the caller name
reported by the modem was too long.
Additionally, the faxspool script supplied with versions of Mgetty prior to
1.1.29 used a simple permissions scheme to allow or deny fax transmission
privileges. This scheme was easily circumvented because the spooling
directory used for outgoing faxes was world-writable.
All users of Mgetty should upgrade to these errata packages, which
contain Mgetty 1.1.30 and are not vulnerable to these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 2 ia64
- Red Hat Enterprise Linux Workstation 2 ia64
Fixes
- BZ - 81261 - mgetty (<1.1.29) security issues
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.