Vulnerabilities > CVE-2008-2357 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Matt Kimball and Roger Wolff MTR
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record. NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Buffer Overflow via Environment Variables This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
- Overflow Buffers Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
- Client-side Injection-induced Buffer Overflow This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
- Filter Failure through Buffer Overflow In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
- MIME Conversion An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200806-01.NASL description The remote host is affected by the vulnerability described in GLSA-200806-01 (mtr: Stack-based buffer overflow) Adam Zabrocki reported a boundary error within the split_redraw() function in the file split.c, possibly leading to a stack-based buffer overflow. Impact : A remote attacker could use a specially crafted resolved hostname to execute arbitrary code with root privileges. However, it is required that the attacker controls the DNS server used by the victim, and that the last seen 2020-06-01 modified 2020-06-02 plugin id 33084 published 2008-06-04 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/33084 title GLSA-200806-01 : mtr: Stack-based buffer overflow code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 200806-01. # # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(33084); script_version("1.14"); script_cvs_date("Date: 2019/08/02 13:32:45"); script_cve_id("CVE-2008-2357"); script_xref(name:"GLSA", value:"200806-01"); script_name(english:"GLSA-200806-01 : mtr: Stack-based buffer overflow"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-200806-01 (mtr: Stack-based buffer overflow) Adam Zabrocki reported a boundary error within the split_redraw() function in the file split.c, possibly leading to a stack-based buffer overflow. Impact : A remote attacker could use a specially crafted resolved hostname to execute arbitrary code with root privileges. However, it is required that the attacker controls the DNS server used by the victim, and that the '-p' (or '--split') command line option is used. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200806-01" ); script_set_attribute( attribute:"solution", value: "All mtr users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=net-analyzer/mtr-0.73-r1'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_cwe_id(119); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:mtr"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2008/06/03"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/06/04"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"net-analyzer/mtr", unaffected:make_list("ge 0.73-r1"), vulnerable:make_list("lt 0.73-r1"))) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get()); else security_warning(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mtr"); }
NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2008-210-06.NASL description New mtr packages are available for Slackware 12.0, 12.1, and -current to fix a security issue. last seen 2020-06-01 modified 2020-06-02 plugin id 33751 published 2008-07-29 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/33751 title Slackware 12.0 / 12.1 / current : mtr (SSA:2008-210-06) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Slackware Security Advisory 2008-210-06. The text # itself is copyright (C) Slackware Linux, Inc. # include("compat.inc"); if (description) { script_id(33751); script_version("1.13"); script_cvs_date("Date: 2019/10/25 13:36:21"); script_cve_id("CVE-2008-2357"); script_xref(name:"SSA", value:"2008-210-06"); script_name(english:"Slackware 12.0 / 12.1 / current : mtr (SSA:2008-210-06)"); script_summary(english:"Checks for updated package in /var/log/packages"); script_set_attribute( attribute:"synopsis", value:"The remote Slackware host is missing a security update." ); script_set_attribute( attribute:"description", value: "New mtr packages are available for Slackware 12.0, 12.1, and -current to fix a security issue." ); # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.352681 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?19917456" ); script_set_attribute(attribute:"solution", value:"Update the affected mtr package."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_cwe_id(119); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:slackware:slackware_linux:mtr"); script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux"); script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:12.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:slackware:slackware_linux:12.1"); script_set_attribute(attribute:"patch_publication_date", value:"2008/07/29"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/07/29"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc."); script_family(english:"Slackware Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Slackware/release", "Host/Slackware/packages"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("slackware.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Slackware/release")) audit(AUDIT_OS_NOT, "Slackware"); if (!get_kb_item("Host/Slackware/packages")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Slackware", cpu); flag = 0; if (slackware_check(osver:"12.0", pkgname:"mtr", pkgver:"0.73", pkgarch:"i486", pkgnum:"1_slack12.0")) flag++; if (slackware_check(osver:"12.1", pkgname:"mtr", pkgver:"0.73", pkgarch:"i486", pkgnum:"1_slack12.1")) flag++; if (slackware_check(osver:"current", pkgname:"mtr", pkgver:"0.73", pkgarch:"i486", pkgnum:"1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:slackware_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family SuSE Local Security Checks NASL id SUSE_MTR-5289.NASL description This update fixes a stack based buffer overflow which could potentially be exploited by a remote attacker to execute arbitrary code (CVE-2008-2357). last seen 2020-06-01 modified 2020-06-02 plugin id 33386 published 2008-07-02 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/33386 title openSUSE 10 Security Update : mtr (mtr-5289) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update mtr-5289. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(33386); script_version ("1.8"); script_cvs_date("Date: 2019/10/25 13:36:32"); script_cve_id("CVE-2008-2357"); script_name(english:"openSUSE 10 Security Update : mtr (mtr-5289)"); script_summary(english:"Check for the mtr-5289 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "This update fixes a stack based buffer overflow which could potentially be exploited by a remote attacker to execute arbitrary code (CVE-2008-2357)." ); script_set_attribute(attribute:"solution", value:"Update the affected mtr packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_cwe_id(119); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mtr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:mtr-gtk"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.2"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.3"); script_set_attribute(attribute:"patch_publication_date", value:"2008/05/28"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/07/02"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE10\.2|SUSE10\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "10.2 / 10.3", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE10.2", reference:"mtr-0.72-20") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"mtr-gtk-0.72-20") ) flag++; if ( rpm_check(release:"SUSE10.3", reference:"mtr-0.72-94.2") ) flag++; if ( rpm_check(release:"SUSE10.3", reference:"mtr-gtk-0.72-94.2") ) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mtr / mtr-gtk"); }
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1587.NASL description Adam Zabrocki discovered that under certain circumstances mtr, a full screen ncurses and X11 traceroute tool, could be tricked into executing arbitrary code via overly long reverse DNS records. last seen 2020-06-01 modified 2020-06-02 plugin id 32447 published 2008-05-28 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/32447 title Debian DSA-1587-1 : mtr - buffer overflow code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-1587. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(32447); script_version("1.12"); script_cvs_date("Date: 2019/08/02 13:32:21"); script_cve_id("CVE-2008-2357"); script_bugtraq_id(29290); script_xref(name:"DSA", value:"1587"); script_name(english:"Debian DSA-1587-1 : mtr - buffer overflow"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Adam Zabrocki discovered that under certain circumstances mtr, a full screen ncurses and X11 traceroute tool, could be tricked into executing arbitrary code via overly long reverse DNS records." ); script_set_attribute( attribute:"see_also", value:"https://www.debian.org/security/2008/dsa-1587" ); script_set_attribute( attribute:"solution", value: "Upgrade the mtr package. For the stable distribution (etch), this problem has been fixed in version 0.71-2etch1." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(119); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:mtr"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:4.0"); script_set_attribute(attribute:"patch_publication_date", value:"2008/05/26"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/05/28"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"4.0", prefix:"mtr", reference:"0.71-2etch1")) flag++; if (deb_check(release:"4.0", prefix:"mtr-tiny", reference:"0.71-2etch1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family SuSE Local Security Checks NASL id SUSE_MTR-5291.NASL description This update fixes a stack-based buffer overflow which could potentially be exploited by a remote attacker to execute arbitrary code. (CVE-2008-2357) last seen 2020-06-01 modified 2020-06-02 plugin id 33387 published 2008-07-02 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/33387 title SuSE 10 Security Update : mtr (ZYPP Patch Number 5291) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The text description of this plugin is (C) Novell, Inc. # include("compat.inc"); if (description) { script_id(33387); script_version ("1.13"); script_cvs_date("Date: 2019/10/25 13:36:32"); script_cve_id("CVE-2008-2357"); script_name(english:"SuSE 10 Security Update : mtr (ZYPP Patch Number 5291)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote SuSE 10 host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "This update fixes a stack-based buffer overflow which could potentially be exploited by a remote attacker to execute arbitrary code. (CVE-2008-2357)" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2008-2357.html" ); script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 5291."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_cwe_id(119); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux"); script_set_attribute(attribute:"patch_publication_date", value:"2008/05/28"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/07/02"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled."); if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE."); if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages."); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) exit(1, "Failed to determine the architecture type."); if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented."); flag = 0; if (rpm_check(release:"SLES10", sp:1, reference:"mtr-0.69-18.7")) flag++; if (rpm_check(release:"SLES10", sp:1, reference:"mtr-gtk-0.69-18.7")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"mtr-0.69-18.7")) flag++; if (rpm_check(release:"SLES10", sp:2, reference:"mtr-gtk-0.69-18.7")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else exit(0, "The host is not affected.");
Statements
contributor | Mark J Cox |
lastmodified | 2008-06-25 |
organization | Red Hat |
statement | This issue does not affect the versions of mtr as shipped with Red Hat Enterprise Linux 4 or 5. For Red Hat Enterprise Linux 2.1 and 3, this issue can only be exploited if an attacker can convince victim to use mtr to trace path to or via the IP, for which an attacker controls PTR DNS records. Additionally, the victim must run mtr in "split mode" by providing -p or --split command line options. The Red Hat Security Response Team has therefore rated this issue as having low security impact, a future update may address this flaw. |
References
- ftp://ftp.bitwizard.nl/mtr/mtr-0.73.diff
- ftp://ftp.bitwizard.nl/mtr/mtr-0.73.diff
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
- http://seclists.org/fulldisclosure/2008/May/0488.html
- http://seclists.org/fulldisclosure/2008/May/0488.html
- http://secunia.com/advisories/30312
- http://secunia.com/advisories/30312
- http://secunia.com/advisories/30340
- http://secunia.com/advisories/30340
- http://secunia.com/advisories/30359
- http://secunia.com/advisories/30359
- http://secunia.com/advisories/30522
- http://secunia.com/advisories/30522
- http://secunia.com/advisories/30967
- http://secunia.com/advisories/30967
- http://security.gentoo.org/glsa/glsa-200806-01.xml
- http://security.gentoo.org/glsa/glsa-200806-01.xml
- http://securityreason.com/securityalert/3903
- http://securityreason.com/securityalert/3903
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0175
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0175
- http://www.debian.org/security/2008/dsa-1587
- http://www.debian.org/security/2008/dsa-1587
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:176
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:176
- http://www.openwall.com/lists/oss-security/2008/05/21/1
- http://www.openwall.com/lists/oss-security/2008/05/21/1
- http://www.openwall.com/lists/oss-security/2008/05/21/3
- http://www.openwall.com/lists/oss-security/2008/05/21/3
- http://www.openwall.com/lists/oss-security/2008/05/21/4
- http://www.openwall.com/lists/oss-security/2008/05/21/4
- http://www.securityfocus.com/archive/1/492260/100/0/threaded
- http://www.securityfocus.com/archive/1/492260/100/0/threaded
- http://www.securityfocus.com/bid/29290
- http://www.securityfocus.com/bid/29290
- http://www.securitytracker.com/id?1020046
- http://www.securitytracker.com/id?1020046
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42535
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42535
- https://issues.rpath.com/browse/RPL-2558
- https://issues.rpath.com/browse/RPL-2558