blob: d5f246e8884ba9a2e4352a73cd4cb632d0882530 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200411-04">
<title>Speedtouch USB driver: Privilege escalation vulnerability</title>
A vulnerability in the Speedtouch USB driver can be exploited to allow
local users to execute arbitrary code with escalated privileges.
<product type="ebuild">speedtouch</product>
<announced>November 02, 2004</announced>
<revised>November 02, 2004: 01</revised>
<package name="net-dialup/speedtouch" auto="yes" arch="*">
<unaffected range="ge">1.3.1</unaffected>
<vulnerable range="lt">1.3.1</vulnerable>
The speedtouch package contains a driver for the ADSL SpeedTouch USB modem.
The Speedtouch USB driver contains multiple format string vulnerabilities
in modem_run, pppoa2 and pppoa3. This flaw is due to an improperly made
syslog() system call.
<impact type="high">
A malicious local user could exploit this vulnerability by causing a buffer
overflow, and potentially allowing the execution of arbitrary code with
escalated privileges.
There is no known workaround at this time.
All Speedtouch USB driver users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dialup/speedtouch-1.3.1"</code>
<uri link="">CAN-2004-0834</uri>
<uri link="">Speedtouch Project News Announcements</uri>
<metadata tag="requester" timestamp="Fri, 29 Oct 2004 08:13:35 +0000">
<metadata tag="submitter" timestamp="Fri, 29 Oct 2004 13:15:40 +0000">
<metadata tag="bugReady" timestamp="Tue, 2 Nov 2004 13:27:33 +0000">