Debian Security Advisory DSA 309-1 (eterm)

Summary
The remote host is missing an update to eterm announced via advisory DSA 309-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20309-1
Insight
'bazarr' discovered that eterm is vulnerable to a buffer overflow of the ETERMPATH environment variable. This bug can be exploited to gain the privileges of the group 'utmp' on a system where eterm is installed. For the stable distribution (woody), this problem has been fixed in version 0.9.2-0pre2002042903.1. The old stable distribution (potato) is not affected by this bug. For the unstable distribution (sid) this problem will be fixed soon. We recommend that you update your eterm package.