Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Link to Us
Linux Jobs

More on LinuxToday

Advisories: June 27, 2005

Jun 28, 2005, 04:45 (0 Talkback[s])

Gentoo Linux

Gentoo Linux Security Advisory GLSA 200506-23

Severity: Normal
Title: Clam AntiVirus: Denial of Service vulnerability
Date: June 27, 2005
Bugs: #96960
ID: 200506-23


Clam AntiVirus is vulnerable to a Denial of Service attack when processing certain Quantum archives.


Clam AntiVirus is a GPL anti-virus toolkit, designed for integration with mail servers to perform attachment scanning. Clam AntiVirus also provides a command line scanner and a tool for fetching updates of the virus database.

Affected packages

     Package               /  Vulnerable  /                 Unaffected

  1  app-antivirus/clamav      < 0.86.1                      >= 0.86.1


Andrew Toller and Stefan Kanthak discovered that a flaw in libmspack's Quantum archive decompressor renders Clam AntiVirus vulnerable to a Denial of Service attack.


A remote attacker could exploit this vulnerability to cause a Denial of Service by sending a specially crafted Quantum archive to the server.


There is no known workaround at this time.


All Clam AntiVirus users should upgrade to the latest available version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.86.1"


[ 1 ] Clam AntiVirus Release Notes


This GLSA and any updates to it are available for viewing at the Gentoo Security Website:


Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to or alternatively, you may file a bug at


Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

SUSE Linux

SUSE Security Announcement

Package: RealPlayer
Announcement ID: SUSE-SA:2005:037
Date: Mon, 27 Jun 2005 12:00:00 +0000
Affected Products: SUSE LINUX 9.2, 9.3 Novell Linux Desktop 9
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CAN-2005-1766 CAN-2005-1277

Content of This Advisory:

  1. Security Vulnerability Resolved: remote buffer overflow in RealPlayer Problem Description
  2. Solution or Work-Around
  3. Special Instructions and Notes
  4. Package Location and Checksums
  5. Pending Vulnerabilities, Solutions, and Work-Arounds: See SUSE Security Summary Report.
  6. Authenticity Verification and Additional Information

1) Problem Description and Brief Discussion

Various security problems were found in RealPlayer that allow a remote attacker to execute code in the local player by providing handcrafted files.

See too.

The following security bugs are listed:

  • To fashion a malicious MP3 file to allow the overwriting of a local file or execution of an ActiveX control on a customer's machine.
  • To fashion a malicious RealMedia file which uses RealText to cause a heap overflow to allow an attacker to execute arbitrary code on a customer's machine.
  • To fashion a malicious AVI file to cause a buffer overflow to allow an attacker to execute arbitrary code on a customer's machine.
  • Using default settings of earlier Internet Explorer browsers, a malicious website could cause a local HTML file to be created and then trigger an RM file to play which would then reference this local HTML file. (Not applicable to Linux.)

The updated package fixes these problems.

These are tracked by the Mitre CVE IDs CAN-2005-1766 and CAN-2005-1277.

This bug affects all SUSE Linux versions including RealPlayer.

However, due to the binary only nature of RealPlayer we are only able to provide fixed packages for SUSE Linux 9.2, 9.3 and Novell Linux Desktop 9.

For the SUSE Linux versions containing RealPlayer 8 we are no longer able to offer security updates (as announced in SUSE-SA:2005:04).

2) Solution or Work-Around

Please install the upgraded packages.

3) Special Instructions and Notes

Please restart web browser which have Real Media content open.

4) Package Location and Checksums

The preferred method for installing security updates is to use the YaST Online Update (YOU) tool. YOU detects which updates are required and automatically performs the necessary steps to verify and install them. Alternatively, download the update packages for your distribution manually and verify their integrity by the methods listed in Section 6 of this announcement. Then install the packages using the command

rpm -Fhv <file.rpm>

to apply the update, replacing <file.rpm> with the filename of the downloaded RPM package.

Our maintenance customers are notified individually. The packages are offered for installation from the maintenance web.

x86 Platform:

SUSE Linux 9.3: 0e61a92f6867ebc94283a734381d0ad5

SUSE Linux 9.2: d5c0cef03bef44c91971f41195d91afb

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

See SUSE Security Summary Report.

6) Authenticity Verification and Additional Information

  • Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web sites. The authenticity and integrity of a SUSE security announcement is guaranteed by a cryptographic signature in each announcement. All SUSE security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file and run the command

    gpg --verify <file>

    replacing <file> with the name of the file where you saved the announcement. The output for a valid signature looks like:

    gpg: Signature made <DATE> using RSA key ID 3D25D3D9
    gpg: Good signature from "SuSE Security Team <>"

    where <DATE> is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can import it from the first installation CD. To import the key, use the command

    gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  • Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the world. While this service is considered valuable and important to the free and open source software community, the authenticity and the integrity of a package needs to be verified to ensure that it has not been tampered with.

    There are two verification methods that can be used independently from each other to prove the authenticity of a downloaded file or RPM package:

    1. Using the internal gpg signatures of the rpm package
    2. MD5 checksums as provided in this announcement
      1. The internal rpm package signatures provide an easy way to verify the authenticity of an RPM package. Use the command

        rpm -v --checksig <file.rpm>

        to verify the signature of the package, replacing <file.rpm> with the filename of the RPM package downloaded. The package is unmodified if it contains a valid signature from with the key ID 9C800ACA. This key is automatically imported into the RPM database (on RPMv4-based distributions) and the gpg key ring of 'root' during installation. You can also find it on the first installation CD and at the end of this announcement.

      2. If you need an alternative means of verification, use the md5sum

        command to verify the authenticity of the packages. Execute the command

        md5sum <filename.rpm>

        after you downloaded the file from a SUSE FTP server or its mirrors. Then compare the resulting md5sum with the one that is listed in the SUSE security announcement. Because the announcement containing the checksums is cryptographically signed (by, the checksums show proof of the authenticity of the package if the signature of the announcement is valid. Note that the md5 sums published in the SUSE Security Announcements are valid for the respective packages only. Newer versions of these packages cannot be verified.

  • SUSE runs two security mailing lists to which any interested party may subscribe:

  • General Linux and SUSE security discussion.
    All SUSE security announcements are sent to this list. To subscribe, send an e-mail to


  • SUSE's announce-only mailing list.
    Only SUSE's security announcements are sent to this list. To subscribe, send an e-mail to


For general information or the frequently asked questions (FAQ), send mail to <> or <>.

SUSE's security contact is <> or <>. The <> public key is listed below.

The information in this advisory may be distributed or reproduced, provided that the advisory is not modified in any way. In particular, the clear text signature should show proof of the authenticity of the text.

SUSE Linux Products GmbH provides no warranties of any kind whatsoever with respect to the information contained in this security advisory.

Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <>

Ubuntu Linux

Ubuntu Security Notice USN-143-1 June 27, 2005
linux-source-2.6.10, linux-source- vulnerabilities
CAN-2005-1762, CAN-2005-1765

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected:


The problem can be corrected by upgrading the affected package to version (for Ubuntu 4.10) and 2.6.10-34.3 (for Ubuntu 5.04). You need to reboot your computer after doing a standard system upgrade to effect the necessary changes.

Details follow:

A Denial of Service vulnerability has been discovered in the ptrace() call on the amd64 platform. By calling ptrace() with specially crafted ("non-canonical") addresses, a local attacker could cause the kernel to crash. This only affects the amd64 platform. (CAN-2005-1762)

ZouNanHai discovered that a local user could hang the kernel by invoking syscall() with specially crafted arguments. This only affects the amd64 platform when running in the 32 bit compatibility mode. (CAN-2005-1765)

Updated packages for Ubuntu 4.10 (Warty Warthog):

Source archives:
Size/MD5: 3148786 5684fa4265e100d4f7e0ecd50bbff553
Size/MD5: 2121 23acda1f8cc18472f7812f440fb7db73
Size/MD5: 44728688 79730a3ad4773ba65fab65515369df84

Architecture independent packages:
Size/MD5: 6157334 4cce67d98b33c4c7f77066bc84ca7e8f
Size/MD5: 1506016 fe82d98050b96bf0442ec2086163e027
Size/MD5: 36722880 c038ffc06aa48ebe0acfa08081e4cf34
Size/MD5: 309074 0b5258dae1901c3a738c0d425416e1e5

amd64 architecture (Athlon64, Opteron, EM64T Xeon)
Size/MD5: 248508 e82eed5a22e3da8cd75c98b731a3f749
Size/MD5: 244438 1c3c983a9bae9d3f102d4e8bb5535f1e
Size/MD5: 247632 6a0d788965bf683b9546c1c8df96bc08
Size/MD5: 243124 a49107912d496a49f46c303d1147566c
Size/MD5: 3180136 bb2e32bbd753c0659e02530d1679525b
Size/MD5: 14352450 61ccbf29109504092dcc51746714fab1
Size/MD5: 14829808 54b0108fefe337ec74d7e24dc28bc394
Size/MD5: 14863706 67f51f0f8c7e186ea43e7af739b7272b
Size/MD5: 14686674 e7ccf9d556fb8d261c00a5c7e3cec4c4

i386 architecture (x86 compatible Intel/AMD)
Size/MD5: 277828 91cd82408402f52e65d8688152d2ae13
Size/MD5: 273136 ac79e043a8ff85b96a3ba9c8d6ae1e76
Size/MD5: 275788 89363f9923799f1054e38a13bde1ad9d
Size/MD5: 273068 d13f01c525873b399fbce9b4c4ee205d
Size/MD5: 275830 a64af73569f0ccdce45bc30ff86cdf55
Size/MD5: 3220910 64569d74c2445bb19a9d2bd800b3fc84
Size/MD5: 15496866 0b28c85a112cc66b0433b269520ed1a8
Size/MD5: 16346292 67c155d9de11896df82d1f72056fb69c
Size/MD5: 16516304 ff45b8639f34db16067cc6486c52432d
Size/MD5: 16450016 12a8f40e9161eef916877ae0238399b5
Size/MD5: 16575382 9fab3ef4f5bf729890a12764c512baa1

powerpc architecture (Apple Macintosh G3/G4/G5)
Size/MD5: 213314 d150ed9a98c8d291268e373ebc06ee43
Size/MD5: 214064 2f8e373511c177f990bc9c48610a9699
Size/MD5: 213110 2d3acb6a9229602d529fc7e372d54ea7
Size/MD5: 213766 1a0d07ba295a32212d42a5cabf4ed7c6
Size/MD5: 213676 b32f2e6cdbcad819b4b1952d75f7503a
Size/MD5: 215842 908141d3894c3a6d813d98f8fb409f92
Size/MD5: 3297936 f3bf8686b745e752ba84d003c6c52834
Size/MD5: 16370048 99feed44fe9cb0ea2dde291a0a487efa
Size/MD5: 15942368 b17c0ace95edeace1d6bfe166af80555
Size/MD5: 16356182 c48283d2086fe62043f8f5a96ee6c3bd
Size/MD5: 15931568 1ea1996af06f9dbdb314f15c2b823752
Size/MD5: 16291686 0857d7d4afe26defa34410dd86df2e56
Size/MD5: 15975684 8ed98d07d28266f4b99e54e785b75607

Updated packages for Ubuntu 5.04 (Hoary Hedgehog):

Source archives:
Size/MD5: 6142851 decfbb02b7fda923b92a7d5f4c6e128a
Size/MD5: 3145 5b7f4dd65d034e49ffae29fde96e20c7
Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747

Architecture independent packages:
Size/MD5: 6778322 30c16bdc3071d46a40f5758f1078b162
Size/MD5: 37513152 a8d860f5dc20679976c51ee9fe3fd91d
Size/MD5: 503064 32211250ba22fd4e812d43a950f2c875

amd64 architecture (Athlon64, Opteron, EM64T Xeon)
Size/MD5: 20822 628a38d9f2e1360e01bc4fc57f1c3d66
Size/MD5: 47396 d9cd2b221114e1a81780a2d8a5693760
Size/MD5: 88888 a14f3bb6529dbd8d569b5621887466b1
Size/MD5: 30014 336054a6e6e70a525836ed7ac44a5406
Size/MD5: 41234 b6235b6425d397e1bc91d7013bcc591f
Size/MD5: 73600 a2dcf596de3c9254bf19f305263cd8a9
Size/MD5: 5738 03f3ed199555a74ed2c58b38681df642
Size/MD5: 34852 2e5a6ccadb2db7583cbd60a22f9f6d91
Size/MD5: 55180 7a67903fb1e57387df5049c79356c82a
Size/MD5: 112920 feb3e75e2efd25547de6f09b25ae6d2b
Size/MD5: 40806 62437fe8c14dd68d2d9ab4fec1c18545
Size/MD5: 115724 f07eda0c23dc70a119eaff14f2447823
Size/MD5: 174634 64e34618c1e0bb819099c129902dbe2b
Size/MD5: 82588 1e43e0389aa06606465472e1f153730f
Size/MD5: 1465810 f4d802ad36dc44f99f18fab785e74974
Size/MD5: 285062 a9ae1f7ead62d4b945fef32e96434aac
Size/MD5: 281836 62dd85ffc7f36411f43bdf4c88bd8940
Size/MD5: 284100 8cc028d41867636bff36f8d28b8694b7
Size/MD5: 279362 b0ce5abcbfc6cbcf4d48e70ff2a68f89
Size/MD5: 6135830 c45f07c0eabe157dd6878e927c7aefeb
Size/MD5: 14572980 1a9b4ad3980a4f07f4d654445313dc79
Size/MD5: 15120374 b22d523ad483d2c895a73e050d28f932
Size/MD5: 15086620 078e0f8811624d1538fb1dc9cec2a2f1
Size/MD5: 14959636 1e56ac623905179cd343f2397fe77ca7
Size/MD5: 1349322 7930371cf0ffa7bdb212fced74892eb6
Size/MD5: 14222 baea98d025e7aa2a1c62837d9b8863da
Size/MD5: 178484 10af472c14d594c7bdaa2c4cfb760867
Size/MD5: 174848 8f858ddc191e4f642673a34dbda88916
Size/MD5: 731032 cc3f046b60757f59f639c29aae6aa7a8
Size/MD5: 780906 ceac9b63c8431f32cbf5159c93fe5d37
Size/MD5: 150020 9f738e24059163982b0bd782f1432844
Size/MD5: 168130 4bf0a48b69790f36191a649540d2fb0d
Size/MD5: 9552 8ab6574b3e899e5a29ebe36914b3ceaa
Size/MD5: 94858 a3241965872d05e7887b77edb5f8cc8f
Size/MD5: 45722 8c63e759f853cbf7d0a9aa644f6b72ab
Size/MD5: 33154 a1eb2fb604b673d14ee8bf37388a46ba
Size/MD5: 55288 a3a36a434b9fd6f34610290e4135af00
Size/MD5: 4660 1bff64141121f9943fcd1fb2452107fa
Size/MD5: 7840 8985ed4c0a3ae824963a1c9d88e042f2
Size/MD5: 53804 78a14420f9ec596fa9c58f93c713f1fc
Size/MD5: 111102 2adc47b929725da8dc7fbbc6dd4d2e54
Size/MD5: 10156 7a88696a774842da9c57673e3242b21e
Size/MD5: 60454 b34d12d3cf9d4b2dded6c1447347cb6d
Size/MD5: 208570 1974cc6be6e974eb4f4b6d4af0fb05e3
Size/MD5: 69248 b815b4ce198504f4a3f8fbbff3b00d5a
Size/MD5: 394736 e45a3bf6f464a89b587a66dc897e604c
Size/MD5: 294470 7732c9070561c4775ca2c54dbd774aad
Size/MD5: 12070 66c06b795fab120a0381babf256fc540
Size/MD5: 22654 dbff942dc975e47f6da7d4422ee9896e
Size/MD5: 28796 dd2f28faa14671c4d5b39fb1b69fcbfc
Size/MD5: 56782 722a873cd70a7db4e042f7d8794317c2
Size/MD5: 34938 b200ba3a7127992525aba3ea43ab9e39
Size/MD5: 247454 acbc28affea51ab31bbd80bb96e411da

i386 architecture (x86 compatible Intel/AMD)
Size/MD5: 18162 273ddca7dcbc4238fe349d4d4b78cb25
Size/MD5: 44826 2e1d5029abea35a2f5dfa10453974d86
Size/MD5: 103042 7685a7be5b5d5ed0aa05bdae869e28d2
Size/MD5: 86008 16ff7411c1f5689fdd23df1253e34a91
Size/MD5: 29094 db679d10e207b7f909796514e6e6a393
Size/MD5: 39780 e8a7dbce1d676cf8b7dc5319e65d0f71
Size/MD5: 71152 e03e5740363aee273d36a4eaaa5d7c3c
Size/MD5: 5504 5cb1ba0c2f0d26bf429433a95e8623f9
Size/MD5: 31584 314cc16438f14c07d6c001051d3100e2
Size/MD5: 52942 b5e48d30e9daed26b5f8469a7a04b891
Size/MD5: 104392 91cec7fdaddace7716f5b7eac282b308
Size/MD5: 38622 7859f176489639f291c69a75ec1cf88a
Size/MD5: 114546 ff58604cfa515e07cc68f929b607ec94
Size/MD5: 190654 737b8670a725193ae5151b7928f8a973
Size/MD5: 86540 d68606235e14cdf46540e9d3d423f2a8
Size/MD5: 1389408 cd040061b255de9414bfa64b8e0da555
Size/MD5: 312942 ce17ab5afa7e7239d8649c8466e147ab
Size/MD5: 308640 8150c8b73c8550315381f9fcaee6e542
Size/MD5: 310704 18d7886f5f4b6f1e9199765ae723a8dd
Size/MD5: 308672 4737a80facff693e9a0b888b5eafd30e
Size/MD5: 310736 b9de2540bd92086b5e81cdd2b3407e6b
Size/MD5: 6132588 e71bdace8b804c759b943365aa0d5dcd
Size/MD5: 15610886 b54cc5377f30c4adbdce01ac2c827a06
Size/MD5: 16186642 77f63b1007eda941e264c514dbf359da
Size/MD5: 16606520 e57932ea0088f4599d8c0badc982b792
Size/MD5: 16294158 8959ff1d0a4dd6e56ac47f3ed812d65a
Size/MD5: 16671190 6feb01bb227b3adc2b9a41fe075903ee
Size/MD5: 1349214 202cfee0d7f7c88ece6a0818e6d56dc7
Size/MD5: 14078 500440c09076ac479fd1bdccd86c29d2
Size/MD5: 183182 3918130e47051f38a71b1edddef288b5
Size/MD5: 172740 67bb1bc61388ee8c28d6c3834ea35a72
Size/MD5: 967820 997c8140f2db408b3f09dfec64940ff0
Size/MD5: 780704 f17c1f2f07cd374ca54ab5518c93b1ac
Size/MD5: 140660 08b670dc1212bd10fca40a28b560572f
Size/MD5: 167970 23d1480f48aff2f57c7a339ab3ba156b
Size/MD5: 9348 2ac67e122a296731e8efab9009b6321e
Size/MD5: 89328 b0e8ad6c81d1996660f71bd43f3f1650
Size/MD5: 48132 68c4bc9465b4793eb828575b53dd2d93
Size/MD5: 30886 5caa84534235716e4588c67f6113ebca
Size/MD5: 65898 0d9199c6e03161b57c4d8ddc0d2724ad
Size/MD5: 4508 b83f33bc16789d5757fa99b612ccad2e
Size/MD5: 7754 33d61848a82f50b943d58f2b2ce53afe
Size/MD5: 50778 e395734ea42e4a1b2cb1a29ab30bee74
Size/MD5: 111586 d35a5c1954ac2e70e1872d82101b0fe1