Lucene search

K
gentooGentoo FoundationGLSA-200703-17
HistoryMar 18, 2007 - 12:00 a.m.

ulogd: Remote execution of arbitrary code

2007-03-1800:00:00
Gentoo Foundation
security.gentoo.org
10

0.005 Low

EPSS

Percentile

75.2%

Background

ulogd is a userspace daemon for netfilter related logging.

Description

SUSE reported unspecified buffer overflows in ulogd involving the calculation of string lengths.

Impact

A remote attacker could trigger a possible buffer overflow through unspecified vectors, potentially leading to the remote execution of arbitrary code with the rights of the user running the ulogd daemon, or more probably leading to the crash of the daemon.

Workaround

There is no known workaround at this time.

Resolution

All ulogd users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-admin/ulogd-1.23-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-admin/ulogd< 1.23-r1UNKNOWN

0.005 Low

EPSS

Percentile

75.2%