blob: 163e95b9e5be0b5ba6a7fa7c820fa00e9847b257 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200406-02">
<title>tripwire: Format string vulnerability</title>
A vulnerability allowing arbitrary code execution under certain
circumstances has been found.
<product type="ebuild">tripwire</product>
<announced>June 04, 2004</announced>
<revised>May 22, 2006: 02</revised>
<package name="app-admin/tripwire" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="le"></vulnerable>
tripwire is an open source file integrity checker.
The code that generates email reports contains a format string
vulnerability in pipedmailmessage.cpp.
<impact type="high">
With a carefully crafted filename on a local filesystem an attacker
could cause execution of arbitrary code with permissions of the user
running tripwire, which could be the root user.
There is no known workaround at this time.
All tripwire users should upgrade to the latest stable version:
# emerge sync
# emerge -pv &quot;&gt;=app-admin/tripwire-;
# emerge &quot;&gt;=app-admin/tripwire-;</code>
<uri link="">Bugtraq Announcement</uri>
<uri link="">CVE-2004-0536</uri>
<metadata tag="submitter">