Update: SuSE glibc

An overflow vulnerability in the xdrmem_getbytes() function that's part of the XDR RPC library (which is part of glibc) could be exploited to run arbitrary code on the affected machine.

The overflow occurs in the function xdrmem_getbytes() and can be used by external attackers to execute arbitrary code. There is no temporary workaround for this security problem other than disabling all RPC based server and client programs. The permanent solution is to update the glibc packages with the update packages.

For details, see http://lists2.suse.com/archive/suse-security-announce/2003-May/0002.html.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about Suse

Show Comments