DSA-017-1 jazip -- buffer overflow

Related Vulnerabilities: CVE-2001-0110  

With older versions of jazip a user could gain root access for members of the floppy group to the local machine. The interface doesn't run as root anymore and this very exploit was prevented. The program now also truncates DISPLAY to 256 characters if it is bigger, which closes the buffer overflow (within xforms). We recommend you upgrade your jazip package immediately.

Debian Security Advisory

DSA-017-1 jazip -- buffer overflow

Date Reported:
23 Jan 2001
Affected Packages:
jazip
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 2209.
In Mitre's CVE dictionary: CVE-2001-0110.
More information:
With older versions of jazip a user could gain root access for members of the floppy group to the local machine. The interface doesn't run as root anymore and this very exploit was prevented. The program now also truncates DISPLAY to 256 characters if it is bigger, which closes the buffer overflow (within xforms).

We recommend you upgrade your jazip package immediately.

Fixed in:

Debian 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/jazip_0.33-1.dsc
http://security.debian.org/dists/stable/updates/main/source/jazip_0.33-1.diff.gz
http://security.debian.org/dists/stable/updates/main/source/jazip_0.33.orig.tar.gz
alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/jazip_0.33-1_alpha.deb
arm:
http://security.debian.org/dists/stable/updates/main/binary-arm/jazip_0.33-1_arm.deb
i386:
http://security.debian.org/dists/stable/updates/main/binary-i386/jazip_0.33-1_i386.deb
m68k:
http://security.debian.org/dists/stable/updates/main/binary-m68k/jazip_0.33-1_m68k.deb
powerpc:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/jazip_0.33-1_powerpc.deb
sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/jazip_0.33-1_sparc.deb