[SECURITY] [DSA 1165-1] New capi4hylafax packages fix arbitrary command execution
From: [email protected] (Martin Schulze)
Date: Fri, 1 Sep 2006 15:04:49 +0200 (CEST)
Subject: [SECURITY] [DSA 1165-1] New capi4hylafax packages fix arbitrary command execution
Priority: urgent
Resent-Message-ID: <scPsN.A.RYB.9BD-EB@murphy.>
Reply-To: [email protected]
Mail-Followup-To: [email protected]
To: [email protected]
Resent-Date: Fri, 1 Sep 2006 08:07:09 -0500 (CDT)
Resent-From: [email protected] (Mailing List Manager)
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1165-1 [email protected]
http://www.debian.org/security/ Martin Schulze
September 1st, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : capi4hylafax
Vulnerability : missing input sanitising
Problem type : remote
Debian-specific: no
CVE ID : CVE-2006-3126
Lionel Elie Mamane discovered a security vulnerability in
capi4hylafax, tools for faxing over a CAPI 2.0 device, that allows
remote attackers to execute arbitrary commands on the fax receiving
system.
For the stable distribution (sarge) this problem has been fixed in
version 01.02.03-10sarge2.
For the unstable distribution (sid) this problem has been fixed in
version 01.03.00.99.svn.300-3.
We recommend that you upgrade your capi4hylafax package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2.dsc
Size/MD5 checksum: 700 ed2b42302da19f397f54be5b6ab2c70d
http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2.diff.gz
Size/MD5 checksum: 233973 cb882036840592b6365e890ba2bef034
http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03.orig.tar.gz
Size/MD5 checksum: 400508 8236290d6b880ee7d5e2fe970648ad6f
Alpha architecture:
http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_alpha.deb
Size/MD5 checksum: 269704 e89fb2126460ebf99fabd817ccc135e1
AMD64 architecture:
http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_amd64.deb
Size/MD5 checksum: 205810 4fbbb15d7c0b8fa9548f669756b04c36
ARM architecture:
http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_arm.deb
Size/MD5 checksum: 210290 5c6e249abe28be123f35321175c0caea
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_i386.deb
Size/MD5 checksum: 202278 829c7e7f7aa7b51ea52aba913b84f6e9
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_ia64.deb
Size/MD5 checksum: 341896 020682a6d4bb63d083a05d961bddaaa8
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_m68k.deb
Size/MD5 checksum: 183464 42cddb1cc2295fd753b50a0f49e9a3f4
PowerPC architecture:
http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_powerpc.deb
Size/MD5 checksum: 213034 6ccc6390878b66462fc4b4c501521025
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/c/capi4hylafax/capi4hylafax_01.02.03-10sarge2_sparc.deb
Size/MD5 checksum: 206634 6d82ddf94cd42c355bc125d1d542a1e9
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFE+C/wW5ql+IAeqTIRAkIZAJ4mfhKYxOX8EOA1VvW4jsfiFwbRxACfe87y
/Kh03ZBkuNBfo8Vjk3yE+/c=
=1aMB
-----END PGP SIGNATURE-----