DSA-124-1 mtr -- buffer overflow

Related Vulnerabilities: CVE-2002-0497  

The authors of mtr released a new upstream version, noting a non-exploitable buffer overflow in their ChangeLog. Przemyslaw Frasunek, however, found an easy way to exploit this bug, which allows an attacker to gain access to the raw socket, which makes IP spoofing and other malicious network activity possible. The problem has been fixed by the Debian maintainer in version 0.41-6 for the stable distribution of Debian by backporting the upstream fix and in version 0.48-1 for the testing/unstable distribution. We recommend that you upgrade your mtr package immediately.

Debian Security Advisory

DSA-124-1 mtr -- buffer overflow

Date Reported:
26 Mar 2002
Affected Packages:
mtr
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 4217.
In Mitre's CVE dictionary: CVE-2002-0497.
More information:

The authors of mtr released a new upstream version, noting a non-exploitable buffer overflow in their ChangeLog. Przemyslaw Frasunek, however, found an easy way to exploit this bug, which allows an attacker to gain access to the raw socket, which makes IP spoofing and other malicious network activity possible.

The problem has been fixed by the Debian maintainer in version 0.41-6 for the stable distribution of Debian by backporting the upstream fix and in version 0.48-1 for the testing/unstable distribution.

We recommend that you upgrade your mtr package immediately.

Fixed in:

Debian GNU/Linux 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/mtr_0.41.orig.tar.gz
http://security.debian.org/dists/stable/updates/main/source/mtr_0.41-6.dsc
http://security.debian.org/dists/stable/updates/main/source/mtr_0.41-6.diff.gz
Alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/mtr_0.41-6_alpha.deb
ARM:
http://security.debian.org/dists/stable/updates/main/binary-arm/mtr_0.41-6_arm.deb
Intel ia32:
http://security.debian.org/dists/stable/updates/main/binary-i386/mtr_0.41-6_i386.deb
Motorola 680x0:
http://security.debian.org/dists/stable/updates/main/binary-m68k/mtr_0.41-6_m68k.deb
PowerPC:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/mtr_0.41-6_powerpc.deb
Sun Sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/mtr_0.41-6_sparc.deb

MD5 checksums of the listed files are available in the original advisory.