lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20081214202327.GA4042@galadriel.inutil.org>
Date: Sun, 14 Dec 2008 21:23:27 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 1686-1] New no-ip packages fix arbitrary code execution

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1686-1                  security@...ian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
December 14, 2008                     http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : no-ip
Vulnerability  : buffer overflow
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2008-5297
Debian Bug     : 506179

A buffer overflow has been discovered in the HTTP parser of the No-IP.com
Dynamic DNS update client, which may result in the execution of arbitrary
code.

For the stable distribution (etch), this problem has been fixed in
version 2.1.1-4+etch1.

For the upcoming stable distribution (lenny) and the unstable distribution
(sid), this problem has been fixed in version 2.1.7-11.

We recommend that you upgrade your no-ip package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1.diff.gz
    Size/MD5 checksum:     5099 991539fbaabc7808f1e6540e6d2a7d37
  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1.orig.tar.gz
    Size/MD5 checksum:    70553 a743fcd40699596d25347083eca86d52
  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1.dsc
    Size/MD5 checksum:      573 a46cc0befc6409b256e76abceec2bba8

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_alpha.deb
    Size/MD5 checksum:    25552 72ada61d338c9ca7ccf22de55168de1b

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_amd64.deb
    Size/MD5 checksum:    22740 eea473fb4410d7b7953150139378b56c

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_arm.deb
    Size/MD5 checksum:    21486 eb86554f2e2b20c382810bcfce21ac96

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_hppa.deb
    Size/MD5 checksum:    23778 7212e0f6ef1b749de5531ff279fe63d1

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_i386.deb
    Size/MD5 checksum:    20838 44598c7737861f61e7c6f012c65228f7

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_ia64.deb
    Size/MD5 checksum:    30888 ba8e62cc6fe5bf70631710b699adb9da

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_mips.deb
    Size/MD5 checksum:    23936 f3d9215b718a083354e9b9426577aafb

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_mipsel.deb
    Size/MD5 checksum:    23854 69f6d783ff8345c565910877e2db4909

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_powerpc.deb
    Size/MD5 checksum:    22514 550fe870f5d0cb85e2ab96c510d70127

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_s390.deb
    Size/MD5 checksum:    22842 37f9132b2f6aae1a828405ae701a325c

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_sparc.deb
    Size/MD5 checksum:    21020 191248685382bb6051853bba9081f012


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAklFavwACgkQXm3vHE4uylr6PACfecCxr6ytpCw+L6lwdkRCO1E+
+osAoMrr6OmEO0SRfP5ViXSr4hglrye5
=H5rj
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ