Subject: Re: CERT Advisory CA-99.12 - Buffer Overflow in amd
To: None <netbsd-help@netbsd.org>
From: Claude Marinier <marinier@dreo.dnd.ca>
List: netbsd-help
Date: 09/17/1999 08:18:51
Are we vulnerable?

--------------------
Claude Marinier, Information Technology Group    claude.marinier@dreo.dnd.ca 
Defence Research Establishment Ottawa (DREO)    (613) 998-4901  FAX 998-2675
3701 Carling Avenue, Ottawa, Ontario  K1A 0Z4         http://www.dreo.dnd.ca

---------- Forwarded message ----------
Date: Thu, 16 Sep 1999 16:12:55 -0400
From: CERT Advisory <cert-advisory@cert.org>
Subject: CERT Advisory CA-99.12 - Buffer Overflow in amd

-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-99-12 Buffer Overflow in amd

   Original release date: September 16, 1999
   Last revised: --
   Source: CERT/CC
   
   A complete revision history is at the end of this file.
   
Systems Affected

     * Systems running amd, the Berkeley Automounter Daemon
       
I. Description

   There is a buffer overflow vulnerability in the logging facility of
   the amd daemon.
   
   This daemon automatically mounts file systems in response to attempts
   to access files that reside on those file systems. Similar
   functionality on some systems is provided by a daemon named
   automountd.
   
   Systems that include automounter daemons based on BSD 4.x source code
   may also be vulnerable. A vulnerable implementation of amd is included
   in the am-utils package, provided with many Linux distributions.
   
II. Impact

   Remote intruders can execute arbitrary code as the user running the
   amd daemon (usually root).
   
III. Solution

Install a patch from your vendor

Disable amd