- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-13
- - ---------------------------------------------------------------------

          PACKAGE : man
          SUMMARY : arbitrary code execution
             DATE : 2003-03-18 18:03 UTC
          EXPLOIT : local
VERSIONS AFFECTED : <1.5l : fixed version>=1.5l
              CVE : CAN-2003-0124

- - ---------------------------------------------------------------------

- From advisory:

"man 1.5l was released today, fixing a bug which results in arbitrary code
execution upon reading a specially formatted man file. The basic problem
is, upon finding a string with a quoting problem, the function my_xsprintf
in util.c will return "unsafe" (rather than returning a string which could
be interpreted by the shell). This return value is passed directly to
system(3) - meaning if there is any program named `unsafe`, it will execute
with the privs of the user."

Read the full advisory at: 
http://marc.theaimsgroup.com/?l=bugtraq&m=104740927915154&w=2

SOLUTION

It is recommended that all Gentoo Linux users who are running
sys-apps/man upgrade to man-1.5l as follows:

emerge sync
emerge man
emerge clean

- - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at   
- - ---------------------------------------------------------------------

1.5l

Gentoo: man arbitrary code execution

man 1.5l fixes a bug which results in arbitrary code execution upon reading a specially formatted man file.

Summary


- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-13
- - ---------------------------------------------------------------------

- - ---------------------------------------------------------------------
- From advisory:
"man 1.5l was released today, fixing a bug which results in arbitrary code execution upon reading a specially formatted man file. The basic problem is, upon finding a string with a quoting problem, the function my_xsprintf in util.c will return "unsafe" (rather than returning a string which could be interpreted by the shell). This return value is passed directly to system(3) - meaning if there is any program named `unsafe`, it will execute with the privs of the user."
Read the full advisory at: http://marc.theaimsgroup.com/?l=bugtraq&m=104740927915154&w=2
SOLUTION
It is recommended that all Gentoo Linux users who are running sys-apps/man upgrade to man-1.5l as follows:
emerge sync emerge man emerge clean
- - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - - ---------------------------------------------------------------------
1.5l

Resolution

References

Availability

Concerns

Severity
PACKAGE : man
SUMMARY : arbitrary code execution
DATE : 2003-03-18 18:03 UTC
EXPLOIT : local
VERSIONS AFFECTED : <1.5l : fixed version>=1.5l
CVE : CAN-2003-0124

Synopsis

Background

Affected Packages

Impact

Workaround

Related News