Debian Security Advisory DSA 406-1 | security@debian.org |
http://www.debian.org/security/ | Martin Schulze |
January 5th, 2004 | http://www.debian.org/security/faq |
Package | : | lftp |
Vulnerability | : | buffer overflow |
Problem-Type | : | remote |
Debian-specific | : | no |
CVE ID | : | CAN-2003-0963 |
Ulf Harnhammar discovered a buffer overflow in lftp, a set of
sophisticated command-line FTP/HTTP client programs. An attacker
could create a carefully crafted directory on a website so that the
execution of an ‘ls’ or ‘rels’ command would lead to the execution
of arbitrary code on the client machine.
For the stable distribution (woody) this problem has been fixed
in version 2.4.9-1woody2.
For the unstable distribution (sid) this problem has been fixed
in version 2.6.10-1.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2.dsc
Size/MD5 checksum: 604 f5daa8b9ca0b4a3dd775ece1d5d90dbc
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2.diff.gz
Size/MD5 checksum: 23483 9f2005abc309b9e44c09e4518063f811
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9.orig.tar.gz
Size/MD5 checksum: 1479880 53ce980339e1adb0c4ec7135950d2055
Alpha architecture:
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2_alpha.deb
Size/MD5 checksum: 506612 8c0580626371c756c0a0c62eeb5128f0
ARM architecture:
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2_arm.deb
Size/MD5 checksum: 443624 8b2393f949aeca43699e27527d4e3179
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2_i386.deb
Size/MD5 checksum: 441070 96b40a457747a309b72e240bf88f1dcd
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2_ia64.deb
Size/MD5 checksum: 602626 bbc526e8b9212b5b1e80558958677299
HP Precision architecture:
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2_hppa.deb
Size/MD5 checksum: 499616 8ad2c1349fe16284b8f904d88177e9ee
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2_m68k.deb
Size/MD5 checksum: 423600 652c35b149e1ce3bb6602ed17430e1a2
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2_mips.deb
Size/MD5 checksum: 472524 7545ec21b6a423373538ecd941848e5a
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2_mipsel.deb
Size/MD5 checksum: 470934 3153069a5cd81582d270bb0341b30c08
PowerPC architecture:
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2_powerpc.deb
Size/MD5 checksum: 457702 4d58d1f70d75f8a8f173f5d966ced97a
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2_s390.deb
Size/MD5 checksum: 452260 149e1fbbc06fdad45b0cf64cb3d43350
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/l/lftp/lftp_2.4.9-1woody2_sparc.deb
Size/MD5 checksum: 445716 07b1e6b07e9a4a7f47bddebf82c5f372
These files will probably be moved into the stable distribution
on its next revision.
Debian Security Advisory DSA 407-1 | security@debian.org |
http://www.debian.org/security/ | Martin Schulze |
January 5th, 2004 | http://www.debian.org/security/faq |
Package | : | ethereal |
Vulnerability | : | buffer overflows |
Problem-Type | : | remote |
Debian-specific | : | no |
CVE IDs | : | CAN-2003-0925 CAN-2003-0926 CAN-2003-0927 CAN-2003-1012 CAN-2003-1013 |
Several vulnerabilities were discovered upstream in ethereal, a
network traffic analyzer. The Common Vulnerabilities and Exposures
project identifies the following problems:
CAN-2003-0925
A buffer overflow allows remote attackers to cause a denial of
service and possibly execute arbitrary code via a malformed GTP
MSISDN string.
CAN-2003-0926
Via certain malformed ISAKMP or MEGACO packets remote attackers
are able to cause a denial of service (crash).
CAN-2003-0927
A heap-based buffer overflow allows remote attackers to cause a
denial of service (crash) and possibly execute arbitrary code via
the SOCKS dissector.
CAN-2003-1012
The SMB dissector allows remote attackers to cause a denial of
service via a malformed SMB packet that triggers a segmentation
fault during processing of selected packets.
CAN-2003-1013
The Q.931 dissector allows remote attackers to cause a denial of
service (crash) via a malformed Q.931, which triggers a null
dereference.
For the stable distribution (woody) this problem has been fixed
in version 0.9.4-1woody6.
For the unstable distribution (sid) this problem has been fixed
in version 0.10.0-1.
We recommend that you upgrade your ethereal and tethereal
packages.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6.dsc
Size/MD5 checksum: 679 6c3d2beab693578b827bc0c2ecc13eb2
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6.diff.gz
Size/MD5 checksum: 37597 7456c1b4708a869295bb71480300370d
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4.orig.tar.gz
Size/MD5 checksum: 3278908 42e999daa659820ee93aaaa39ea1e9ea
Alpha architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_alpha.deb
Size/MD5 checksum: 1940256 e8a45a24a24a145f2870d65b26fdda20
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_alpha.deb
Size/MD5 checksum: 334238 0035322af1972fa6c1547e881b5b27fa
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_alpha.deb
Size/MD5 checksum: 222006 da4e9538a37ac5dd740010b828afed8b
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_alpha.deb
Size/MD5 checksum: 1706878 3c2e6c03f6383f3ae8d599a01853c344
ARM architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_arm.deb
Size/MD5 checksum: 1634664 f5f5d2aeba5fa26ac8d6b722f4d52b39
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_arm.deb
Size/MD5 checksum: 297294 267317a8d6f43f009673f3e9864e0308
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_arm.deb
Size/MD5 checksum: 205964 fe0528d0ee4b0922d1a449f9c12c0b81
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_arm.deb
Size/MD5 checksum: 1439166 390f1e6d9173454162195c47a10c6a0e
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_i386.deb
Size/MD5 checksum: 1512408 b9efde468cca1ddd6b731a3b343bd51d
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_i386.deb
Size/MD5 checksum: 286370 c618774e3718d11d94347b0d66f72af4
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_i386.deb
Size/MD5 checksum: 198298 a7c01d2560880e783e899cd623a27e7a
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_i386.deb
Size/MD5 checksum: 1325838 a7706f7f82b44a30d4a99b299c58b4ca
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_ia64.deb
Size/MD5 checksum: 2150174 e2aba915304534ac4fbb060a2552d9c6
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_ia64.deb
Size/MD5 checksum: 373042 f06169aeefd918e4e5b809393edb8dc2
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_ia64.deb
Size/MD5 checksum: 233630 e7f788d020319a8147beb4172cdc736f
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_ia64.deb
Size/MD5 checksum: 1860802 6c8ef685b4e61f34a0146eb6fc666fdb
HP Precision architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_hppa.deb
Size/MD5 checksum: 1803668 213d7f4221de714ee5c4ef938d0bae54
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_hppa.deb
Size/MD5 checksum: 322334 b6ebeeb39d2d57c0ed664f65389e55a2
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_hppa.deb
Size/MD5 checksum: 216804 fd2e27b35aedd419a12db17bee96c596
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_hppa.deb
Size/MD5 checksum: 1575270 f3ed65cc62fb1155e8e38a25320d0614
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_m68k.deb
Size/MD5 checksum: 1424112 69cccce7cf5ead38369e6d508031d821
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_m68k.deb
Size/MD5 checksum: 282604 e5c3264948cd2cad0c159893173f0748
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_m68k.deb
Size/MD5 checksum: 195028 647f483dbf79dc47a95d48d105d6a7c4
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_m68k.deb
Size/MD5 checksum: 1248072 8085433927ed54f1c1c8196d7c835709
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_mips.deb
Size/MD5 checksum: 1616398 9a41bb228b9b33894825d6cfd2bba741
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_mips.deb
Size/MD5 checksum: 305168 b4a94497386ab45e0494c7980def8e3e
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_mips.deb
Size/MD5 checksum: 213590 20a3ad3d4b5126890aa23179c1730f1a
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_mips.deb
Size/MD5 checksum: 1421550 ad0decba7ea5907e6a3149cacbc178f8
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_mipsel.deb
Size/MD5 checksum: 1596866 0321997c79a03298c65548bb5687e87d
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_mipsel.deb
Size/MD5 checksum: 304676 9a3fad3fe8394ae63f79d09580b41b39
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_mipsel.deb
Size/MD5 checksum: 213222 28bfeefdf54278545c2c132fe381dc12
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_mipsel.deb
Size/MD5 checksum: 1405698 182282caefb7aaf8025559894d7b9801
PowerPC architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_powerpc.deb
Size/MD5 checksum: 1617784 38000a653b7da7552904e66b8c736ecc
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_powerpc.deb
Size/MD5 checksum: 301846 70dede9038a6098642119765c87f6f80
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_powerpc.deb
Size/MD5 checksum: 208786 d69f6942493800fd491e90605d0be931
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_powerpc.deb
Size/MD5 checksum: 1418638 9394c10dff060a961329382c7a3433ad
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_s390.deb
Size/MD5 checksum: 1574214 a21cbd59b1d36e14da777da012768f21
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_s390.deb
Size/MD5 checksum: 300674 49a6af1c59fe07065267ebc5deecc8b8
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_s390.deb
Size/MD5 checksum: 203854 077f9492da7509958c890e598edadf14
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_s390.deb
Size/MD5 checksum: 1386518 d99962a50a8fafc9c509a67adb3399be
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.9.4-1woody6_sparc.deb
Size/MD5 checksum: 1582634 d0a792b3c2428ac28476799e888cef98
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.9.4-1woody6_sparc.deb
Size/MD5 checksum: 317982 936008ca75fecdec66519475f8466525
http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.9.4-1woody6_sparc.deb
Size/MD5 checksum: 204626 2633099c059446cff5d41703718fb7bf
http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.9.4-1woody6_sparc.deb
Size/MD5 checksum: 1388944 ede08f8bc62f1a5141a0bb2ed2ceea1d
These files will probably be moved into the stable distribution
on its next revision.
For apt-get: deb http://security.debian.org/
stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>;