Aviso de seguridad de Debian

DSA-906-1 sylpheed -- desbordamientos de buffer

Fecha del informe:
22 de nov de 2005
Paquetes afectados:
sylpheed
Vulnerable:
Referencias a bases de datos de seguridad:
En el sistema de seguimiento de errores de Debian: error 338436.
En el diccionario CVE de Mitre: CVE-2005-3354.
Información adicional:

Colin Leroy descubrió varios desbordamientos de buffer en algunas de las rutinas de importación de sylpheed, un cliente de correo electrónico ligero para GTK+, que podía provocar la ejecución de código arbitrario.

La tabla siguiente explica qué versiones corrigen esta vulnerabilidad.

  estable anterior (woody) estable (sarge) inestable (sid)
sylpheed 0.7.4-4woody1 1.0.4-1sarge1 2.0.4-1
sylpheed-gtk1 no d. no d. 1.0.6-1
sylpheed-claws 0.7.4claws-3woody1 1.0.4-1sarge1 1.0.5-2
sylpheed-claws-gtk2 no d. no d. 1.9.100-1

Le recomendamos que actualice el paquete sylpheed.

Arreglado en:

Debian GNU/Linux 3.0 (woody)

Fuentes:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1.dsc
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1.diff.gz
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4.orig.tar.gz
Componentes independientes de la arquitectura:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed-doc_0.7.4-4woody1_all.deb
Alpha:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_0.7.4-4woody1_sparc.deb

Debian GNU/Linux 3.1 (sarge)

Fuentes:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1.dsc
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1.diff.gz
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4.orig.tar.gz
Componentes independientes de la arquitectura:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed-i18n_1.0.4-1sarge1_all.deb
Alpha:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/s/sylpheed/sylpheed_1.0.4-1sarge1_sparc.deb

Las sumas MD5 de los ficheros que se listan están disponibles en el aviso original.