Home > Security > Advisories

Advisories

Mandriva Advisories

Package name grip
Date April 1st, 2005
Advisory ID MDKSA-2005:066
Affected versions 10.0, 10.1, CS3.0
Synopsis Updated grip packages fix vulnerability

Problem Description

A buffer overflow bug was found by Joseph VanAndel in the way that grip
handles data returned by CDDB servers. If a user connected to a
malicious CDDB server, an attacker could execute arbitrary code on the
user's machine.

The updated packages have been patched to correct these issues.

Updated Packages

Mandrakelinux 10.0

 125e28ae9091cfa5852f89a025a9a886  10.0/RPMS/grip-3.1.4-1.1.100mdk.i586.rpm
b37da3355866e7bcd6dcc99b46b08085  10.0/SRPMS/grip-3.1.4-1.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64

 dee617d6a08a063365e2e3486e534ded  amd64/10.0/RPMS/grip-3.1.4-1.1.100mdk.amd64.rpm
b37da3355866e7bcd6dcc99b46b08085  amd64/10.0/SRPMS/grip-3.1.4-1.1.100mdk.src.rpm

Mandrakelinux 10.1

 53c482bf56570e86946894e50193a869  10.1/RPMS/grip-3.2.0-3.1.101mdk.i586.rpm
051f5840fbc226370bdc6933bdc7de23  10.1/SRPMS/grip-3.2.0-3.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64

 58ca3a87c97206fe8d0567e3e4660e07  x86_64/10.1/RPMS/grip-3.2.0-3.1.101mdk.x86_64.rpm
051f5840fbc226370bdc6933bdc7de23  x86_64/10.1/SRPMS/grip-3.2.0-3.1.101mdk.src.rpm

Corporate Server 3.0

 d98c1c3843113b7870da3a78bb13085b  corporate/3.0/RPMS/grip-3.1.4-1.1.C30mdk.i586.rpm
cc1f10dd7b4f31e1091cfce12602baa8  corporate/3.0/SRPMS/grip-3.1.4-1.1.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 bfc65d100286a4fed5c69a5ba2776b95  x86_64/corporate/3.0/RPMS/grip-3.1.4-1.1.C30mdk.x86_64.rpm
cc1f10dd7b4f31e1091cfce12602baa8  x86_64/corporate/3.0/SRPMS/grip-3.1.4-1.1.C30mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0706

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.