Debian Security Advisory

DSA-186-1 log2mail -- buffer overflow

Date Reported:
01 Nov 2002
Affected Packages:
log2mail
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2002-1251.
More information:

Enrico Zini discovered a buffer overflow in log2mail, a daemon for watching logfiles and sending lines with matching patterns via mail. The log2mail daemon is started upon system boot and runs as root. A specially crafted (remote) log message could overflow a static buffer, potentially leaving log2mail to execute arbitrary code as root.

This problem has been fixed in version 0.2.5.1 the current stable distribution (woody) and in version 0.2.6-1 for the unstable distribution (sid). The old stable distribution (potato) is not affected since it doesn't contain a log2mail package.

We recommend that you upgrade your log2mail package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1.dsc
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1_ia64.deb
HP Precision:
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/l/log2mail/log2mail_0.2.5.1_sparc.deb

MD5 checksums of the listed files are available in the original advisory.