Bug#386182: AW: Bug#386182: CVE-2006-4305: remote arbitrary code execution
Hi, I am trying to prepare 7.5.00.38, too, but am having difficulties getting it to compile. But I do have the changeset to fix the overflow, and if I can't get build 38 done by the week-end I will try and apply the fix against 7.5.00.34. Thanks for your effort. Martin. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#386182: CVE-2006-4305: remote arbitrary code execution
On Tue, Sep 05, 2006 at 09:47:31PM +0200, Stefan Fritsch wrote: Buffer overflow in SAP DB and MaxDB before 7.6.00.30 allows remote attackers to execute arbitrary code via a long database name when connecting via a WebDBM client. FWIW, this is also fixed in 7.5.00.38, as far as I can see. It's available from http://ftp.sunet.se/pub/unix/databases/relational/mysql/Downloads/MaxDB/7.5.00/maxdb-source-7_5_00_38.tgz but I can't the Debian patches to apply cleanly. I'll have a stab at finding the required fix, but given the size of the changesets between these sub-revisions, I'm not sure I'll find it. /* Steinar */ -- Homepage: http://www.sesse.net/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#386182: CVE-2006-4305: remote arbitrary code execution
Package: maxdb-webtools Severity: critical Tags: security A vulnerability has been found in MaxDB (CVE-2006-4305): Buffer overflow in SAP DB and MaxDB before 7.6.00.30 allows remote attackers to execute arbitrary code via a long database name when connecting via a WebDBM client. See e.g. http://secunia.com/advisories/21677 for details Severity critical because I assume it starts WebDBM by default (introduces a security hole on systems where you install the package). If this is not the case, it is only grave. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]