blob: b160c2cd8df81ba07ddb2a4c47af60fc75919f53 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200504-10">
<title>Gld: Remote execution of arbitrary code</title>
Gld contains several serious vulnerabilities, potentially resulting in the
execution of arbitrary code as the root user.
<product type="ebuild">Gld</product>
<announced>April 13, 2005</announced>
<revised>May 22, 2006: 02</revised>
<package name="mail-filter/gld" auto="yes" arch="*">
<unaffected range="ge">1.5</unaffected>
<vulnerable range="le">1.4</vulnerable>
Gld is a standalone greylisting server for Postfix.
dong-hun discovered several buffer overflows in server.c, as well as
several format string vulnerabilities in cnf.c.
<impact type="high">
An attacker could exploit this vulnerability to execute arbitrary code
with the permissions of the user running Gld, the default user being
There is no known workaround at this time.
All Gld users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/gld-1.5&quot;</code>
<uri link="">SecurityTracker ID 1013678</uri>
<uri link="">CVE-2005-1099</uri>
<uri link="">CVE-2005-1100</uri>
<metadata tag="submitter" timestamp="Wed, 13 Apr 2005 10:26:52 +0000">
<metadata tag="bugReady" timestamp="Wed, 13 Apr 2005 12:04:44 +0000">