Debians sikkerhedsbulletin

DSA-012-1 micq -- fjern-buffer-overløb

Rapporteret den:
22. jan 2001
Berørte pakker:
micq
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Bugtraq-databasen (hos SecurityFocus): BugTraq-id 2254.
I Mitres CVE-ordbog: CVE-2001-0233.
Yderligere oplysninger:
PkC har rapporteret at der er et buffer-overløb i sprintf() i micq version 0.4.6 og tidligere, som giver en fjernangriber mulighed for at "snuse" til pakker til ICQ-serveren for at kunne udføre vilkårlige kode på offerets system.

Vi anbefaler at du omgående opgraderer din micq-pakke.

Rettet i:

Debian 2.2 (potato)

Kildekode:
http://security.debian.org/dists/stable/updates/main/source/micq_0.4.3-4.dsc
http://security.debian.org/dists/stable/updates/main/source/micq_0.4.3.orig.tar.gz
http://security.debian.org/dists/stable/updates/main/source/micq_0.4.3-4.diff.gz
alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/micq_0.4.3-4_alpha.deb
arm:
http://security.debian.org/dists/stable/updates/main/binary-arm/micq_0.4.3-4_arm.deb
i386:
http://security.debian.org/dists/stable/updates/main/binary-i386/micq_0.4.3-4_i386.deb
m68k:
http://security.debian.org/dists/stable/updates/main/binary-m68k/micq_0.4.3-4_m68k.deb
powerpc:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/micq_0.4.3-4_powerpc.deb
sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/micq_0.4.3-4_sparc.deb