lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 6 Jan 2004 17:00:07 -0800
From: Matt Zimmerman <mdz@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 414-1] New jabber packages fix denial of service


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 414-1                     security@...ian.org
http://www.debian.org/security/                             Matt Zimmerman
January 6th, 2004                       http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : jabber
Vulnerability  : denial of service
Problem-Type   : remote
Debian-specific: no
CVE Ids        : CAN-2004-0013

A vulnerability was discovered in jabber, an instant messaging server,
whereby a bug in the handling of SSL connections could cause the
server process to crash, resulting in a denial of service.

For the current stable distribution (woody) this problem has been
fixed in version 1.4.2a-1.1woody1.

For the unstable distribution (sid) this problem has been fixed in
version 1.4.3-1.

We recommend that you update your jabber package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1.dsc
      Size/MD5 checksum:      580 efa342add13e86c05cb394604aab89d0
    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1.diff.gz
      Size/MD5 checksum:    61467 d8b19d51fc83095db7132e1c5abc651c
    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a.orig.tar.gz
      Size/MD5 checksum:   690217 10780dbdb93926ea5bb360e1186b939c

  Alpha architecture:

    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_alpha.deb
      Size/MD5 checksum:   241262 e1dfb66863a3392f0e078503fc070ba3

  ARM architecture:

    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_arm.deb
      Size/MD5 checksum:   207750 4f6554511245c45dea401b767e60f8b8

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_i386.deb
      Size/MD5 checksum:   196148 522769b98c8daafcbc98248c41bce10c

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_ia64.deb
      Size/MD5 checksum:   356460 e30221687c1df3ce1e04d56f07e18073

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_hppa.deb
      Size/MD5 checksum:   226222 e62ee0c273d73f325339a954058a6836

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_m68k.deb
      Size/MD5 checksum:   200616 7dcda4e913787e0511eb4dc148ce61ea

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_mips.deb
      Size/MD5 checksum:   203188 7124007a61770fc8146eaa7969757dd2

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_mipsel.deb
      Size/MD5 checksum:   202356 31d39182928dca472a77a516fab60698

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_powerpc.deb
      Size/MD5 checksum:   205032 6a4ea17882063074292b7682abeb032a

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_s390.deb
      Size/MD5 checksum:   210494 d631c49818c85f5b6b003c115b36b7cf

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_sparc.deb
      Size/MD5 checksum:   224836 90d74ff4bc33673515d47e8ede21f6fa

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQE/+1oJArxCt0PiXR4RAmFKAKDZhlXQeKTrcNiLMhF3RGJCd1avZwCdEFmk
g1JNGOzrB5wplcMLf6xtzo8=
=8CXB
-----END PGP SIGNATURE-----



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux - Powered by OpenVZ