[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20041003035437.GL23790@alcor.net>
From: debian-security-announce at lists.debian.org (debian-security-announce@...ts.debian.org)
Subject: [SECURITY] [DSA 556-1] New netkit-telnet packages fix invalid free
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 556-1 security@...ian.org
http://www.debian.org/security/ Matt Zimmerman
October 2nd, 2004 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : netkit-telnet
Vulnerability : invalid free(3)
Problem-Type : remote
Debian-specific: yes
CVE ID : CAN-2004-0911
Debian Bug : 273694
Michal Zalewski discovered a bug in the netkit-telnet server (telnetd)
whereby a remote attacker could cause the telnetd process to free an
invalid pointer. This causes the telnet server process to crash,
leading to a straightforward denial of service (inetd will disable the
service if telnetd is crashed repeatedly), or possibly the execution
of arbitrary code with the privileges of the telnetd process (by
default, the 'telnetd' user).
For the stable distribution (woody) this problem has been fixed in
version 0.17-18woody1.
For the unstable distribution (sid) this problem has been fixed in
version 0.17-26.
We recommend that you upgrade your netkit-telnetpackage.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/n/netkit-telnet/netkit-telnet_0.17-18woody1.dsc
Size/MD5 checksum: 602 9b997bc6951c08c4f22c29dfe8fd6cfb
http://security.debian.org/pool/updates/main/n/netkit-telnet/netkit-telnet_0.17-18woody1.diff.gz
Size/MD5 checksum: 22010 29a22dc590270539e60e040fe33678a3
http://security.debian.org/pool/updates/main/n/netkit-telnet/netkit-telnet_0.17.orig.tar.gz
Size/MD5 checksum: 133749 d6beabaaf53fe6e382c42ce3faa05a36
Alpha architecture:
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_alpha.deb
Size/MD5 checksum: 84080 64e59060bcc7713c33051b129eb7a7b2
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_alpha.deb
Size/MD5 checksum: 45712 dc1f4eba203e25e0e69fde84d0c68deb
ARM architecture:
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_arm.deb
Size/MD5 checksum: 69840 cee0940a812e1c14b3541bd408d8e772
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_arm.deb
Size/MD5 checksum: 39534 78a51c224f171e029799183b8ba42357
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_i386.deb
Size/MD5 checksum: 70668 8f16858a8702fa7840c60fa272f336b5
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_i386.deb
Size/MD5 checksum: 37344 48eadf90962f7641c9b109e6ed0b31e4
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_ia64.deb
Size/MD5 checksum: 102662 7ba021e10ae96097686b70c2b29c281d
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_ia64.deb
Size/MD5 checksum: 52356 a87e16a648e472e06c0bcacdee2a3465
HP Precision architecture:
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_hppa.deb
Size/MD5 checksum: 69878 436ca10d3adf53cf95d0fb1532fe8ca4
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_hppa.deb
Size/MD5 checksum: 43430 f782d2555aba39ac4a3fc375601cbe41
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_m68k.deb
Size/MD5 checksum: 67062 53604751760b712a28141bbfea772f02
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_m68k.deb
Size/MD5 checksum: 37350 b8ba70a9e2b9c94edfbc2d5ad482f5f5
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_mips.deb
Size/MD5 checksum: 80782 34f5870ce7c7e90a7337e4ace622c145
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_mips.deb
Size/MD5 checksum: 42520 005a24828fe4c192cbcaaa1b9e4a4b09
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_mipsel.deb
Size/MD5 checksum: 80670 b9cea5d2edda4f8c9453789c27aae058
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_mipsel.deb
Size/MD5 checksum: 42490 cdb8fbe3737a45b2d215d36f8952c6ee
PowerPC architecture:
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_powerpc.deb
Size/MD5 checksum: 73142 0f784e76f7d00238a9e9b13b880682db
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_powerpc.deb
Size/MD5 checksum: 40184 5e9eddd27a6424698068bc990a98e6da
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_s390.deb
Size/MD5 checksum: 73064 15178fb0215922e8084015c1745db52d
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_s390.deb
Size/MD5 checksum: 41132 b8842ed3b2b92196b78872bfd7486dd6
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnet_0.17-18woody1_sparc.deb
Size/MD5 checksum: 74078 367023264c0accb466316b5ef9479b54
http://security.debian.org/pool/updates/main/n/netkit-telnet/telnetd_0.17-18woody1_sparc.deb
Size/MD5 checksum: 45226 477922c39e0ed5ca85ff8209a93f6386
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFBX3fbArxCt0PiXR4RAs9tAJoCnPwj94m4LhPCEuGGA7DoK227/gCdFji6
9aopH9fu0InxkJNaAkTvI4Y=
=3HVc
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists