All you "dump" users should note the following, from Network
Computing and the SANS Institute <[EMAIL PROTECTED]>:

[ ... ]

*** {00.46.012} Linux - Update {00.45.019}: dump executes arbitrary
                commands as root

RedHat and Trustix have released updated dump RPMs that correct the
vulnerability discussed in {00.45.019} ("dump executes arbitrary
commands as root").

We would like to note that dump should not be set suid/sgid.  Using the
latest version (see location below), there is no need for suid/sgid
permission.

Latest dump package is available at:
ftp://ftp.sourceforge.net/pub/sourceforge/dump/

Updated RedHat RPMs are listed at:
http://archives.neohapsis.com/archives/bugtraq/2000-11/0026.html

Updated Trustix RPMs are listed at:
http://archives.neohapsis.com/archives/bugtraq/2000-11/0047.html

Source: RedHat, Trustix, SF Bugtraq
http://archives.neohapsis.com/archives/bugtraq/2000-11/0047.html
http://archives.neohapsis.com/archives/bugtraq/2000-11/0026.html
http://archives.neohapsis.com/archives/bugtraq/2000-11/0014.html

[ ... ]

(
Excerpt from Security Alert Consensus Number 070,
Thursday, November 9, 2000
http://archives.neohapsis.com/archives/sans/current/0106.html
) 
-- 
-----------------------------------------------------------------
 Dan Wilder <[EMAIL PROTECTED]>     Technical Manager & Correspondent
 SSC, Inc. P.O. Box 55549     Phone:  206-782-7733 x123
 Seattle, WA  98155-0549      URL    http://www.linuxjournal.com/
-----------------------------------------------------------------

Reply via email to