summaryrefslogtreecommitdiffstats
path: root/website/DTSA/DTSA-4-1.html
blob: fc298731f1b84f0ad5dfc162a3301a9dc91311f6 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
<h2>DTSA-4-1</h2>
<dl>
<dt>Date Reported:</dt>
<dd>August 28th, 2005</dd>
<dt>Affected Package:</dt>
<dd><a href='http://packages.debian.org/src:ekg'>ekg</a></dd>
<dt>Vulnerability:</dt>
<dd>multiple vulnerabilities</dd>
<dt>Problem-Scope:</dt>
<dd>local and remote</dd>
<dt>Debian-specific:</dt>
<dd>No<br></dd>
<dt>CVE:</dt>
<dd>
<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1916'>CAN-2005-1916</a> 
<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1851'>CAN-2005-1851</a> 
<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1850'>CAN-2005-1850</a> 
<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1852'>CAN-2005-1852</a> 
<a href='http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2448'>CAN-2005-2448</a> 
<br></dd>
<br><dt>More information:</dt>
<dd>Multiple vulnerabilities were discovered in ekg:&nbsp;<br>
&nbsp;<br>
CAN-2005-1916&nbsp;<br>
&nbsp;<br>
Eric Romang discovered insecure temporary file creation and arbitrary&nbsp;<br>
command execution in a contributed script that can be exploited by a local&nbsp;<br>
attacker.&nbsp;<br>
&nbsp;<br>
CAN-2005-1851&nbsp;<br>
&nbsp;<br>
Marcin Owsiany and Wojtek Kaniewski discovered potential shell command&nbsp;<br>
injection in a contributed script.&nbsp;<br>
&nbsp;<br>
CAN-2005-1850&nbsp;<br>
&nbsp;<br>
Marcin Owsiany and Wojtek Kaniewski discovered insecure temporary file&nbsp;<br>
creation in contributed scripts.&nbsp;<br>
&nbsp;<br>
CAN-2005-1852&nbsp;<br>
&nbsp;<br>
Multiple integer overflows in libgadu, as used in ekg, allows remote&nbsp;<br>
attackers to cause a denial of service (crash) and possibly execute&nbsp;<br>
arbitrary code via an incoming message.&nbsp;<br>
&nbsp;<br>
CAN-2005-2448&nbsp;<br>
&nbsp;<br>
Multiple endianness errors in libgadu in ekg allow remote attackers to&nbsp;<br>
cause a denial of service (invalid behaviour in applications) on&nbsp;<br>
big-endian systems.&nbsp;<br>
</dd>
<br><dt>For the testing distribution (etch) this is fixed in version 1:1.5+20050808+1.6rc3-0etch1</dt>
<dt>For the unstable distribution (sid) this is fixed in version 1:1.5+20050808+1.6rc3-1</dt>
<br><dt>This upgrade is recommended if you use ekg.<dt>
<br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt>

<dd>apt-get update && apt-get install libgadu3 ekg</dd>
<br>

<dt>The Debian testing security team does not track security issues for then stable (sarge) and oldstable (woody) distributions. If stable is vulnerable, the Debian security team will make an announcement once a fix is ready.</dt>

<br>
<dt>To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:<dt>
<br>
<dd>deb http://secure-testing-mirrors.debian.net/debian-security-updates etch-proposed-updates/security-updates main contrib non-free</dd>
<dd>deb-src http://secure-testing-mirrors.debian.net/debian-security-updates etch-proposed-updates/security-updates main contrib non-free</dd>
<br>
<dt>The archive signing key can be downloaded from<dt>
<dd><a href='http://secure-testing.debian.net/ziyi-2005-7.asc'>http://secure-testing.debian.net/ziyi-2005-7.asc</a><dd>

<br>
  
<dt>For further information about the Debian testing security team, please refer to <a href='http://secure-testing.debian.net/'>http://secure-testing.debian.net/</a></dt>

© 2014-2024 Faster IT GmbH | imprint | privacy policy