info
discussion
exploit
solution
references
Xvt -T Buffer Overflow Vulnerability
Solution:
Remote the setuid/setgid bits from 'xvt' until a fix is available.
Debian Linux 2.2
Debian 2.2 i386 xvt_2.1-13.0potato.1_i386.deb
http://security.debian.org/dists/stable/updates/main/binary-i386/xvt_2 .1-13.0potato.1_i386.deb
Debian Linux 2.2 alpha
Debian 2.2 alpha xvt_2.1-13.0potato.1_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/xvt_ 2.1-13.0potato.1_alpha.deb
Debian Linux 2.2 sparc
Debian 2.2 sparc xvt_2.1-13.0potato.1_sparc.deb
http://security.debian.org/dists/stable/updates/main/binary-sparc/xvt_ 2.1-13.0potato.1_sparc.deb
Debian Linux 2.2 arm
Debian 2.2 arm xvt_2.1-13.0potato.1_arm.deb
http://security.debian.org/dists/stable/updates/main/binary-arm/xvt_2. 1-13.0potato.1_arm.deb
Debian Linux 2.2 68k
Debian 2.2 m68k xvt_2.1-13.0potato.1_m68k.deb
http://security.debian.org/dists/stable/updates/main/binary-m68k/xvt_2 .1-13.0potato.1_m68k.deb
Debian Linux 2.2 powerpc
Debian 2.2 ppc xvt_2.1-13.0potato.1_powerpc.deb
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xv t_2.1-13.0potato.1_powerpc.deb
Privacy Statement
Copyright 2010, SecurityFocus