summaryrefslogtreecommitdiffstats
path: root/website/DTSA/DTSA-4-1.html
blob: 1488534ab31365b4fb245e2968a48c2d9dc358d7 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
    <html><head><meta http-equiv="Content-Type" content="text/html; charset=iso8859-1">
    <title>Debian testing security team - Advisory</title>
    <link type="text/css" rel="stylesheet" href="../style.css">
    <link rel="shortcut icon" href="http://www.debian.org/favicon.ico">
    </head>
    <body>
    <div align="center">
    <a href="http://www.debian.org/">

     <img src="http://www.debian.org/logos/openlogo-nd-50.png" border="0" hspace="0" vspace="0" alt=""></a>
    <a href="http://www.debian.org/">
     <img src="http://www.debian.org/Pics/debian.png" border="0" hspace="0" vspace="0" alt="Debian Project"></a>
    </div>
    <br />
    <table class="reddy" width="100%">
    <tr>
    <td class="reddy">
    <img src="http://www.debian.org/Pics/red-upperleft.png" align="left" border="0" hspace="0" vspace="0"
     alt="" width="15" height="16"></td>

    <td rowspan="2" class="reddy">Debian testing security team - Advisory</td>
    <td class="reddy">
    <img src="http://www.debian.org/Pics/red-upperright.png" align="right" border="0" hspace="0" vspace="0"
     alt="" width="16" height="16"></td>
    </tr>
    <tr>
    <td class="reddy">
    <img src="http://www.debian.org/Pics/red-lowerleft.png" align="left" border="0" hspace="0" vspace="0"
     alt="" width="16" height="16"></td>
    <td class="reddy">

    <img src="http://www.debian.org/Pics/red-lowerright.png" align="right" border="0" hspace="0" vspace="0"
     alt="" width="15" height="16"></td>
    </tr>
    </table>

<!-- header -->
<h2>DTSA-4-1</h2>
<dl>
<dt>Date Reported:</dt>
<dd>August 28th, 2005</dd>
<dt>Affected Package:</dt>
<dd><a href='http://packages.debian.org/src:ekg'>ekg</a></dd>
<dt>Vulnerability:</dt>
<dd>multiple vulnerabilities</dd>
<dt>Problem-Scope:</dt>
<dd>local and remote</dd>
<dt>Debian-specific:</dt>
<dd>No<br></dd>
<dt>CVE:</dt>
<dd>
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1916'>CVE-2005-1916</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1851'>CVE-2005-1851</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1850'>CVE-2005-1850</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1852'>CVE-2005-1852</a> 
<a href='http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2448'>CVE-2005-2448</a> 
<br></dd>
<br><dt>More information:</dt>
<dd>Multiple vulnerabilities were discovered in ekg:&nbsp;<br>
&nbsp;<br>
CVE-2005-1916&nbsp;<br>
&nbsp;<br>
Eric Romang discovered insecure temporary file creation and arbitrary&nbsp;<br>
command execution in a contributed script that can be exploited by a local&nbsp;<br>
attacker.&nbsp;<br>
&nbsp;<br>
CVE-2005-1851&nbsp;<br>
&nbsp;<br>
Marcin Owsiany and Wojtek Kaniewski discovered potential shell command&nbsp;<br>
injection in a contributed script.&nbsp;<br>
&nbsp;<br>
CVE-2005-1850&nbsp;<br>
&nbsp;<br>
Marcin Owsiany and Wojtek Kaniewski discovered insecure temporary file&nbsp;<br>
creation in contributed scripts.&nbsp;<br>
&nbsp;<br>
CVE-2005-1852&nbsp;<br>
&nbsp;<br>
Multiple integer overflows in libgadu, as used in ekg, allows remote&nbsp;<br>
attackers to cause a denial of service (crash) and possibly execute&nbsp;<br>
arbitrary code via an incoming message.&nbsp;<br>
&nbsp;<br>
CVE-2005-2448&nbsp;<br>
&nbsp;<br>
Multiple endianness errors in libgadu in ekg allow remote attackers to&nbsp;<br>
cause a denial of service (invalid behaviour in applications) on&nbsp;<br>
big-endian systems.&nbsp;<br>
</dd>
<br><dt>For the testing distribution (etch) this is fixed in version 1:1.5+20050808+1.6rc3-0etch1</dt>
<dt>For the unstable distribution (sid) this is fixed in version 1:1.5+20050808+1.6rc3-1</dt>
<br><dt>This upgrade is recommended if you use ekg.<dt>
<br><dt>If you have the secure testing lines in your sources.list, you can update by running this command as root:</dt>

<dd>apt-get update && apt-get install libgadu3 ekg</dd>
<br>

<dt>The Debian testing security team does not track security issues for then stable (sarge) and oldstable (woody) distributions. If stable is vulnerable, the Debian security team will make an announcement once a fix is ready.</dt>

<br>
<dt>To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:<dt>
<br>
<dd>deb http://secure-testing.debian.net/debian-secure-testing etch/security-updates main contrib non-free</dd>
<dd>deb-src http://secure-testing.debian.net/debian-secure-testing etch/security-updates main contrib non-free</dd>
<br>
<dt>The archive signing key can be downloaded from<dt>
<dd><a href='http://testing-security.debian.net/ziyi-2005-7.asc'>http://testing-security.debian.net/ziyi-2005-7.asc</a><dd>

<br>
  
<dt>For further information about the Debian testing security team, please refer to <a href='http://testing-security.debian.net/'>http://testing-security.debian.net/</a></dt>

<!-- footer -->
<hr>
<a href="http://validator.w3.org/check?uri=referer">
    <img border="0" src="http://www.w3.org/Icons/valid-html401" alt="Valid HTML 4.01!" height="31" width="88"></a>
    <a href="http://jigsaw.w3.org/css-validator/check/referer">
    <img border="0" src="http://jigsaw.w3.org/css-validator/images/vcss" alt="Valid CSS!"
     height="31" width="88"></a>


</body></html>

© 2014-2024 Faster IT GmbH | imprint | privacy policy