Security update for package traceroute
(Last modified: 11NOV2002)
solutions Security update for package traceroute SuSE Linux Maintenance Web (9625189d4ee7d273a25db9c9fef96dfc)
SuSE Linux Enterprise Server 7 for IBM zSeries
SuSE eMail Server III
SuSE Linux Enterprise Server 7 for PowerPC
SuSE Firewall on CD 2 - VPN
SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Enterprise Server 7 for IA64
SuSE Linux Enterprise Server 7 for S/390 and zSeries
SuSE eMail Server 3.1
SuSE Linux Office Server
SuSE Firewall Adminhost VPN
SuSE Firewall on CD 2
SuSE Linux Connectivity Server
tracerouteprogram is installed
setuid root. Buffer overflows allow local attackers to gain root access on a system where traceroute is installed. This update causes the traceroute program to drop root privileges after getting the raw network socket. In addition to this, the buffer overflows are fixed with this update, removing the local root vulnerability.
This update has a different version string than the predecessor packages due to consistency reasons. The string "nanog_6.*" has been converted to "6.*" to allow for an easier comparison of version numbering. By consequence, this update package has release number "0".
rpm -Uvh traceroute.rpm
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.