Home > Security > Advisories

Advisories

Mandriva Advisories

Package name eggdrop
Date September 6th, 2007
Advisory ID MDKSA-2007:175
Affected versions CS3.0, 2007.0, 2007.1
Synopsis Updated eggdrop package fix remote buffer overflow

Problem Description

A stack-based buffer overflow in mod/server.mod/servrmsg.c in Eggdrop
1.6.18, and possibly earlier, allows user-assisted, malicious remote
IRC servers to execute arbitrary code via a long private message.

Updated packages fix this issue.

Updated Packages

Corporate Server 3.0

 885019e8d2f6b0cfb9de05156d64444e  corporate/3.0/i586/eggdrop-1.6.15-3.1.C30mdk.i586.rpm 
 aa1cb17308f08bec5f524d41495e5fc9  corporate/3.0/SRPMS/eggdrop-1.6.15-3.1.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 6913fb0a2f783d2614f34883e40d7664  corporate/3.0/x86_64/eggdrop-1.6.15-3.1.C30mdk.x86_64.rpm 
 aa1cb17308f08bec5f524d41495e5fc9  corporate/3.0/SRPMS/eggdrop-1.6.15-3.1.C30mdk.src.rpm

Mandriva Linux 2007

 42c9df2265dca3aa08ac313581d2f79e  2007.0/i586/eggdrop-1.6.17-3.1mdv2007.0.i586.rpm 
 0b8dab3bb20fa77b8110fba70c0cf42d  2007.0/SRPMS/eggdrop-1.6.17-3.1mdv2007.0.src.rpm

Mandriva Linux 2007/X86_64

 dbe358c197ea69243ea96536814b089c  2007.0/x86_64/eggdrop-1.6.17-3.1mdv2007.0.x86_64.rpm 
 0b8dab3bb20fa77b8110fba70c0cf42d  2007.0/SRPMS/eggdrop-1.6.17-3.1mdv2007.0.src.rpm

Mandriva Linux 2007.1

 a56c9816445a5b4967d03d144aade848  2007.1/i586/eggdrop-1.6.17-3.1mdv2007.1.i586.rpm 
 d8eb704c902f6118cec187ec6cd67bae  2007.1/SRPMS/eggdrop-1.6.17-3.1mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64

 69824e4cf05c6aaed125d3ce5b035d49  2007.1/x86_64/eggdrop-1.6.17-3.1mdv2007.1.x86_64.rpm 
 d8eb704c902f6118cec187ec6cd67bae  2007.1/SRPMS/eggdrop-1.6.17-3.1mdv2007.1.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2807

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.