The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[SECURITY] [DSA 1686-1] New no-ip packages fix arbitrary code execution


<< Previous INDEX Search src / Print Next >>
Date: Sun, 14 Dec 2008 21:23:27 +0100
From: Moritz Muehlenhoff <jmm@debian.org.>
Subject: [SECURITY] [DSA 1686-1] New no-ip packages fix arbitrary code execution
Priority: urgent
Resent-Message-ID: <YY-W6499qBD.A.75C.VtWRJB@liszt.>
Reply-To: [email protected]
Mail-Followup-To: [email protected]
To: [email protected]
Resent-Date: Sun, 14 Dec 2008 20:23:49 +0000 (UTC)
Resent-From: [email protected] (Mailing List Manager)
X-Virus-Scanned: antivirus-gw at tyumen.ru

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1686-1                  [email protected]
http://www.debian.org/security/                       Moritz Muehlenhoff
December 14, 2008                     http://www.debian.org/security/faq
- ------------------------------------------------------------------------


Package        : no-ip
Vulnerability  : buffer overflow
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2008-5297
Debian Bug     : 506179

A buffer overflow has been discovered in the HTTP parser of the No-IP.com
Dynamic DNS update client, which may result in the execution of arbitrary
code.

For the stable distribution (etch), this problem has been fixed in
version 2.1.1-4+etch1.

For the upcoming stable distribution (lenny) and the unstable distribution
(sid), this problem has been fixed in version 2.1.7-11.

We recommend that you upgrade your no-ip package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1.diff.gz
    Size/MD5 checksum:     5099 991539fbaabc7808f1e6540e6d2a7d37
  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1.orig.tar.gz
    Size/MD5 checksum:    70553 a743fcd40699596d25347083eca86d52
  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1.dsc
    Size/MD5 checksum:      573 a46cc0befc6409b256e76abceec2bba8

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_alpha.deb
    Size/MD5 checksum:    25552 72ada61d338c9ca7ccf22de55168de1b

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_amd64.deb
    Size/MD5 checksum:    22740 eea473fb4410d7b7953150139378b56c

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_arm.deb
    Size/MD5 checksum:    21486 eb86554f2e2b20c382810bcfce21ac96

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_hppa.deb
    Size/MD5 checksum:    23778 7212e0f6ef1b749de5531ff279fe63d1

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_i386.deb
    Size/MD5 checksum:    20838 44598c7737861f61e7c6f012c65228f7

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_ia64.deb
    Size/MD5 checksum:    30888 ba8e62cc6fe5bf70631710b699adb9da

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_mips.deb
    Size/MD5 checksum:    23936 f3d9215b718a083354e9b9426577aafb

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_mipsel.deb
    Size/MD5 checksum:    23854 69f6d783ff8345c565910877e2db4909

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_powerpc.deb
    Size/MD5 checksum:    22514 550fe870f5d0cb85e2ab96c510d70127

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_s390.deb
    Size/MD5 checksum:    22842 37f9132b2f6aae1a828405ae701a325c

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_sparc.deb
    Size/MD5 checksum:    21020 191248685382bb6051853bba9081f012


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<;pkg>




-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAklFavwACgkQXm3vHE4uylr6PACfecCxr6ytpCw+L6lwdkRCO1E+
+osAoMrr6OmEO0SRfP5ViXSr4hglrye5
=H5rj
-----END PGP SIGNATURE-----



<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру