Buffer overflow in mtr 0.46 and previous versions, when installed setuid root, allows local users to access a raw socket via a long MTR_OPTIONS environment variable.
The authors of mtr released a new upstream version, noting a
non-exploitable buffer overflow in their ChangeLog Przemyslaw
Frasunek, however, found an easy way to exploit this bug, which allows
an attacker to gain access to the raw socket, which makes IP spoofing
and other malicious network activity possible
The problem has been fixed by the Debi ...