From bugzilla@REDHAT.COM Thu Jan 25 07:44:31 2001 From: bugzilla@REDHAT.COM To: BUGTRAQ@SECURITYFOCUS.COM Date: Wed, 24 Jan 2001 13:17:00 -0500 Subject: [BUGTRAQ] [RHSA-2001:004-04] String format vulnerability in icecast [The following text is in the "iso-8859-1" character set] [Your display is set for the "US-ASCII" character set] [Some characters may be displayed incorrectly] --------------------------------------------------------------------- Red Hat, Inc. Red Hat Security Advisory Synopsis: String format vulnerability in icecast Advisory ID: RHSA-2001:004-04 Issue date: 2001-01-23 Updated on: 2001-01-24 Product: Red Hat Powertools Keywords: Cross references: Obsoletes: --------------------------------------------------------------------- 1. Topic: A remote vulnerablity allows execution of arbitrary code. 2. Relevant releases/architectures: Red Hat Powertools 6.0 - alpha, i386, sparc Red Hat Powertools 6.1 - alpha, i386, sparc Red Hat Powertools 6.2 - alpha, i386, sparc Red Hat Powertools 7.0 - alpha, i386 3. Problem description: A string format vulnerability that allows the execution of arbitrary commands exists in all versions of icecast. A patch was posted to Bugtraq to solve the problem and has been incorporated into this update. All users of icecast should apply this update. 4. Solution: For each RPM for your particular architecture, run: rpm -Fvh [filename] where filename is the name of the RPM. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Powertools 6.0: SRPMS: ftp://updates.redhat.com/powertools/6.0/SRPMS/icecast-1.3.8.beta2-2.src.rpm alpha: ftp://updates.redhat.com/powertools/6.0/alpha/icecast-1.3.8.beta2-2.alpha.rpm i386: ftp://updates.redhat.com/powertools/6.0/i386/icecast-1.3.8.beta2-2.i386.rpm sparc: ftp://updates.redhat.com/powertools/6.0/sparc/icecast-1.3.8.beta2-2.sparc.rpm Red Hat Powertools 6.1: SRPMS: ftp://updates.redhat.com/powertools/6.1/SRPMS/icecast-1.3.8.beta2-2.src.rpm alpha: ftp://updates.redhat.com/powertools/6.1/alpha/icecast-1.3.8.beta2-2.alpha.rpm i386: ftp://updates.redhat.com/powertools/6.1/i386/icecast-1.3.8.beta2-2.i386.rpm sparc: ftp://updates.redhat.com/powertools/6.1/sparc/icecast-1.3.8.beta2-2.sparc.rpm Red Hat Powertools 6.2: SRPMS: ftp://updates.redhat.com/powertools/6.2/SRPMS/icecast-1.3.8.beta2-2.src.rpm alpha: ftp://updates.redhat.com/powertools/6.2/alpha/icecast-1.3.8.beta2-2.alpha.rpm i386: ftp://updates.redhat.com/powertools/6.2/i386/icecast-1.3.8.beta2-2.i386.rpm sparc: ftp://updates.redhat.com/powertools/6.2/sparc/icecast-1.3.8.beta2-2.sparc.rpm Red Hat Powertools 7.0: SRPMS: ftp://updates.redhat.com/powertools/7.0/SRPMS/icecast-1.3.8.beta2-3.src.rpm alpha: ftp://updates.redhat.com/powertools/7.0/alpha/icecast-1.3.8.beta2-3.alpha.rpm i386: ftp://updates.redhat.com/powertools/7.0/i386/icecast-1.3.8.beta2-3.i386.rpm 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 6e10a41120782afa633229384a3de9f5 6.0/SRPMS/icecast-1.3.8.beta2-2.src.rpm feba1b51874808c6d59eae717adc116d 6.0/alpha/icecast-1.3.8.beta2-2.alpha.rpm 17f5ed6b597b38456faff7e8bd1eb828 6.0/i386/icecast-1.3.8.beta2-2.i386.rpm e8c06fc3348e60a3053e7fad06dedeec 6.0/sparc/icecast-1.3.8.beta2-2.sparc.rpm 6e10a41120782afa633229384a3de9f5 6.1/SRPMS/icecast-1.3.8.beta2-2.src.rpm feba1b51874808c6d59eae717adc116d 6.1/alpha/icecast-1.3.8.beta2-2.alpha.rpm 17f5ed6b597b38456faff7e8bd1eb828 6.1/i386/icecast-1.3.8.beta2-2.i386.rpm e8c06fc3348e60a3053e7fad06dedeec 6.1/sparc/icecast-1.3.8.beta2-2.sparc.rpm 6e10a41120782afa633229384a3de9f5 6.2/SRPMS/icecast-1.3.8.beta2-2.src.rpm feba1b51874808c6d59eae717adc116d 6.2/alpha/icecast-1.3.8.beta2-2.alpha.rpm 17f5ed6b597b38456faff7e8bd1eb828 6.2/i386/icecast-1.3.8.beta2-2.i386.rpm e8c06fc3348e60a3053e7fad06dedeec 6.2/sparc/icecast-1.3.8.beta2-2.sparc.rpm 417343d579a7067720300adc8c99b38d 7.0/SRPMS/icecast-1.3.8.beta2-3.src.rpm b728ad07c46c37221e98d5ee905efb2d 7.0/alpha/icecast-1.3.8.beta2-3.alpha.rpm 9fc78917546ab1bc41fb9951d47bf749 7.0/i386/icecast-1.3.8.beta2-3.i386.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg 8. References: Thanks to |CyRaX| for finding the problem and posting it to Bugtraq. For more information please see http://www.securityfocus.com/vdb/bottom.html?vid=2264 Copyright(c) 2000, 2001 Red Hat, Inc.