Subject: buffer overflow in some of pkgsrc
To: None <tech-security@netbsd.org, tech-pkg@netbsd.org>
From: None <itojun@iijlab.net>
List: tech-security
Date: 12/08/1999 18:33:58
  by redmail.netbsd.org with SMTP; 8 Dec 1999 09:34:06 -0000
	by coconut.itojun.org (8.9.3+3.2W/3.7W) with ESMTP id SAA03695;
	Wed, 8 Dec 1999 18:33:58 +0900 (JST)
To: tech-security@netbsd.org, tech-pkg@netbsd.org
Subject: buffer overflow in some of pkgsrc
From: itojun@iijlab.net
Date: Wed, 08 Dec 1999 18:33:58 +0900
Message-ID: <3693.944645638@coconut.itojun.org>

	(it may have been resent by security-officier, but just in case it
	was not)

	There were buffer overflow possibility in some of pkgsrc collection
	we support.  They used old uucplock() function, which used sprintf()
	with short buffer.  Local user may be able to gain a shell with
	"uucp" uid.  Affected pkgsrc are:
		pkgsrc/x11/xmindpath
		pkgsrc/graphics/camediaplay
		pkgsrc/misc/snooper

	Also, "dc3play" (DC-3 digital camera downloading tool) and "docomodoki"
	(phonebook downloader for Japanese cellphones) are affected (they are
	not in NetBSD pkgsrc).

	pkgsrc are already fixed by using the latest version of original
	distribution, or by including specific patch for it.
	Please upgrade to latest version, like:
		xmindpath-1.06a
		camdiaplay-19991202
		snooper-19991202
	by using latest pkgsrc tree.  (or you can disable setuid bit on
	installed binary and run them as privileged user)

itojun