DSA-112-1 hanterm -- buffer overflow

Related Vulnerabilities: CVE-2002-0239  

A set of buffer overflow problems have been found in hanterm, a Hangul terminal for X11 derived from xterm, that will read and display Korean characters in its terminal window. The font handling code in hanterm uses hard limited string variables but didn't check for boundaries. This problem can be exploited by a malicious user to gain access to the utmp group which is able to write the wtmp and utmp files. These files record login and logout activities. This problem has been fixed in version 3.3.1p17-5.2 for the stable Debian distribution. A fixed package for the current testing/unstable distribution is not yet available but will have a version number higher than 3.3.1p18-6.1. We recommend that you upgrade your hanterm packages immediately if you have them installed. Known exploits are already available.

Debian Security Advisory

DSA-112-1 hanterm -- buffer overflow

Date Reported:
16 Feb 2002
Affected Packages:
hanterm
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2002-0239.
More information:

A set of buffer overflow problems have been found in hanterm, a Hangul terminal for X11 derived from xterm, that will read and display Korean characters in its terminal window. The font handling code in hanterm uses hard limited string variables but didn't check for boundaries.

This problem can be exploited by a malicious user to gain access to the utmp group which is able to write the wtmp and utmp files. These files record login and logout activities.

This problem has been fixed in version 3.3.1p17-5.2 for the stable Debian distribution. A fixed package for the current testing/unstable distribution is not yet available but will have a version number higher than 3.3.1p18-6.1.

We recommend that you upgrade your hanterm packages immediately if you have them installed. Known exploits are already available.

Fixed in:

Debian GNU/Linux 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/hanterm_3.3.1p17-5.2.diff.gz
http://security.debian.org/dists/stable/updates/main/source/hanterm_3.3.1p17-5.2.dsc
http://security.debian.org/dists/stable/updates/main/source/hanterm_3.3.1p17.orig.tar.gz
Alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/hanterm_3.3.1p17-5.2_alpha.deb
ARM:
http://security.debian.org/dists/stable/updates/main/binary-arm/hanterm_3.3.1p17-5.2_arm.deb
Intel ia32:
http://security.debian.org/dists/stable/updates/main/binary-i386/hanterm_3.3.1p17-5.2_i386.deb
Motorola 680x0:
http://security.debian.org/dists/stable/updates/main/binary-m68k/hanterm_3.3.1p17-5.2_m68k.deb
PowerPC:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/hanterm_3.3.1p17-5.2_powerpc.deb
Sun Sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/hanterm_3.3.1p17-5.2_sparc.deb

MD5 checksums of the listed files are available in the original advisory.