SHARE
Facebook X Pinterest WhatsApp

Debian GNU/Linux Advisories: uucp and ethereal

Written By
thumbnail
Web Webster
Web Webster
Jun 1, 2002
- ----------------------------------------------------------------------------
Debian Security Advisory                                 security@debian.org
http://www.debian.org/security/                                Michael Stone
May 27, 2002
- ----------------------------------------------------------------------------

Package: uucp
Vulnerability: remote dos
Debian-specific: yes

We have received reports that in.uucpd, an authentication agent in the
uucp package, does not properly terminate certain long input strings.
This has been corrected in uucp package version 1.06.1-11potato3 for
Debian 2.2 (potato) and in version 1.06.1-18 for the upcoming (woody)
release.

We recommend you upgrade your uucp package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/uucp_1.06.1-11potato3.diff.gz
      MD5 checksum: 72a754638558507ee3f1794a22133db3
    http://security.debian.org/dists/stable/updates/main/source/uucp_1.06.1-11potato3.dsc
      MD5 checksum: 549d78afae9c33422dbb325f5e2f60b9
    http://security.debian.org/dists/stable/updates/main/source/uucp_1.06.1.orig.tar.gz
      MD5 checksum: 390af5277915fcadbeee74d2f3038af9

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/main/binary-alpha/uucp_1.06.1-11potato3_alpha.deb
      MD5 checksum: 15fac849328d57860aedf2cba8274170

  ARM architecture:
    http://security.debian.org/dists/stable/updates/main/binary-arm/uucp_1.06.1-11potato3_arm.deb
      MD5 checksum: 410fe766a74528e6b7564821e4b3aa7e

  Intel IA-32 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-i386/uucp_1.06.1-11potato3_i386.deb
      MD5 checksum: 26f22db0eeed4cabad46861112d94d47

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-m68k/uucp_1.06.1-11potato3_m68k.deb
      MD5 checksum: 80ce564f52e43917c7e76411adfe6206

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/uucp_1.06.1-11potato3_powerpc.deb
      MD5 checksum: 744c3a2c394a02ada9ef6c43b539fab9

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/main/binary-sparc/uucp_1.06.1-11potato3_sparc.deb
      MD5 checksum: d3ac8428c4d2f65573b0946a31234422

  These packages will be moved into the stable distribution on its next
  revision.


For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- ----------------------------------------------------------------------------


- ----------------------------------------------------------------------------
Debian Security Advisory                                 security@debian.org
http://www.debian.org/security/                                Michael Stone
June 1, 2002
- ----------------------------------------------------------------------------

Package: ethereal
Vulnerability: remotely triggered memory allocation error
Debian-specific: no

Ethereal versions prior to 0.9.3 were vulnerable to an allocation error
in the ASN.1 parser. This can be triggered when analyzing traffic using
the SNMP, LDAP, COPS, or Kerberos protocols in ethereal. This
vulnerability was announced in the ethereal security advisory
enpa-sa-00003 and has been given the proposed CVE id of CAN-2002-0353.
This issue has been corrected in ethereal version 0.8.0-3potato for
Debian 2.2 (potato).

Additionally, a number of vulnerabilities were discussed in ethereal
security advisory enpa-sa-00004; the version of ethereal in Debian 2.2
(potato) is not vulnerable to the issues raised in this later advisory.
Users of the not-yet-released woody distribution should ensure that they
are running ethereal 0.9.4-1 or a later version.

We recommend you upgrade your ethereal package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
- - ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/ethereal_0.8.0-3potato.diff.gz
      MD5 checksum: 8d05f5473168e92d77fe965b30b8a914
    http://security.debian.org/dists/stable/updates/main/source/ethereal_0.8.0-3potato.dsc
      MD5 checksum: e083a325d87ef253a41be15f1ad4ea8c
    http://security.debian.org/dists/stable/updates/main/source/ethereal_0.8.0.orig.tar.gz
      MD5 checksum: 297ae32cc23a154497dad6a1f964bdb1

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/main/binary-alpha/ethereal_0.8.0-3potato_alpha.deb
      MD5 checksum: 0da95d9307a619f0402aab6a0c041b4c

  ARM architecture:
    http://security.debian.org/dists/stable/updates/main/binary-arm/ethereal_0.8.0-3potato_arm.deb
      MD5 checksum: dc91e56a46c8412be7e152051e418a2a

  Intel IA-32 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-i386/ethereal_0.8.0-3potato_i386.deb
      MD5 checksum: cf6925bce3de49332f93105ac801be31

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-m68k/ethereal_0.8.0-3potato_m68k.deb
      MD5 checksum: 14117385f0553e4ad737be3dd00efc92

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/ethereal_0.8.0-3potato_powerpc.deb
      MD5 checksum: 020b6527e05104d017d42ea755db2e40

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/main/binary-sparc/ethereal_0.8.0-3potato_sparc.deb
      MD5 checksum: 1488ac615bab6c3220c176251c92e29c

  These packages will be moved into the stable distribution on its next
  revision.


For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- - ----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

A Thorough Approach to Improve the Privacy and Security of Your Linux PC
Damien
Oct 24, 2024
Several Russian Maintainers Removed From Linux Kernel Due To Compliance Concerns
Senthil Kumar
Oct 23, 2024
OpenSSH Splits Again: New Authentication Binary Unveiled
Bobby Borisov
Oct 16, 2024
13 Best Free and Open Source Anti-Malware Tools
webmaster
Oct 14, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.