lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20041003035437.GL23790@alcor.net>
From: debian-security-announce at lists.debian.org (debian-security-announce@...ts.debian.org)
Subject: [SECURITY] [DSA 556-1] New netkit-telnet packages fix invalid free

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 556-1                     security@...ian.org
http://www.debian.org/security/                             Matt Zimmerman
October 2nd, 2004                       http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : netkit-telnet
Vulnerability  : invalid free(3)
Problem-Type   : remote
Debian-specific: yes
CVE ID         : CAN-2004-0911
Debian Bug     : 273694

Michal Zalewski discovered a bug in the netkit-telnet server (telnetd)
whereby a remote attacker could cause the telnetd process to free an
invalid pointer.  This causes the telnet server process to crash,
leading to a straightforward denial of service (inetd will disable the
service if telnetd is crashed repeatedly), or possibly the execution
of arbitrary code with the privileges of the telnetd process (by
default, the 'telnetd' user).

For the stable distribution (woody) this problem has been fixed in
version 0.17-18woody1.

For the unstable distribution (sid) this problem has been fixed in
version 0.17-26.

We recommend that you upgrade your netkit-telnetpackage.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/n/netkit-telnet/netkit-telnet_0.17-18woody1.dsc
      Size/MD5 checksum:      602 9b997bc6951c08c4f22c29dfe8fd6cfb
    http://security.debian.org/pool/updates/main/n/netkit-telnet/netkit-telnet_0.17-18woody1.diff.gz
      Size/MD5 checksum:    22010 29a22dc590270539e60e040fe33678a3
    http://security.debian.org/pool/updates/main/n/netkit-telnet/netkit-telnet_0.17.orig.tar.gz
      Size/MD5 checksum:   133749 d6beabaaf53fe6e382c42ce3faa05a36

  Alpha architecture:

    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_alpha.deb
      Size/MD5 checksum:    84080 64e59060bcc7713c33051b129eb7a7b2
    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_alpha.deb
      Size/MD5 checksum:    45712 dc1f4eba203e25e0e69fde84d0c68deb

  ARM architecture:

    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_arm.deb
      Size/MD5 checksum:    69840 cee0940a812e1c14b3541bd408d8e772
    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_arm.deb
      Size/MD5 checksum:    39534 78a51c224f171e029799183b8ba42357

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_i386.deb
      Size/MD5 checksum:    70668 8f16858a8702fa7840c60fa272f336b5
    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_i386.deb
      Size/MD5 checksum:    37344 48eadf90962f7641c9b109e6ed0b31e4

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_ia64.deb
      Size/MD5 checksum:   102662 7ba021e10ae96097686b70c2b29c281d
    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_ia64.deb
      Size/MD5 checksum:    52356 a87e16a648e472e06c0bcacdee2a3465

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_hppa.deb
      Size/MD5 checksum:    69878 436ca10d3adf53cf95d0fb1532fe8ca4
    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_hppa.deb
      Size/MD5 checksum:    43430 f782d2555aba39ac4a3fc375601cbe41

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_m68k.deb
      Size/MD5 checksum:    67062 53604751760b712a28141bbfea772f02
    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_m68k.deb
      Size/MD5 checksum:    37350 b8ba70a9e2b9c94edfbc2d5ad482f5f5

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_mips.deb
      Size/MD5 checksum:    80782 34f5870ce7c7e90a7337e4ace622c145
    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_mips.deb
      Size/MD5 checksum:    42520 005a24828fe4c192cbcaaa1b9e4a4b09

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_mipsel.deb
      Size/MD5 checksum:    80670 b9cea5d2edda4f8c9453789c27aae058
    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_mipsel.deb
      Size/MD5 checksum:    42490 cdb8fbe3737a45b2d215d36f8952c6ee

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_powerpc.deb
      Size/MD5 checksum:    73142 0f784e76f7d00238a9e9b13b880682db
    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_powerpc.deb
      Size/MD5 checksum:    40184 5e9eddd27a6424698068bc990a98e6da

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_s390.deb
      Size/MD5 checksum:    73064 15178fb0215922e8084015c1745db52d
    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_s390.deb
      Size/MD5 checksum:    41132 b8842ed3b2b92196b78872bfd7486dd6

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_sparc.deb
      Size/MD5 checksum:    74078 367023264c0accb466316b5ef9479b54
    http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_sparc.deb
      Size/MD5 checksum:    45226 477922c39e0ed5ca85ff8209a93f6386

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBX3fbArxCt0PiXR4RAs9tAJoCnPwj94m4LhPCEuGGA7DoK227/gCdFji6
9aopH9fu0InxkJNaAkTvI4Y=
=3HVc
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ