Debians sikkerhedsbulletin

DSA-1328-1 unicon-imc2 -- bufferoverløb

Rapporteret den:
1. jul 2007
Berørte pakker:
unicon-imc2
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Mitres CVE-ordbog: CVE-2007-2835.
Yderligere oplysninger:

Steve Kemp fra Debian Security Audit-projektet opdagede at unicon-imc2, en bibliotek til den kinesiske indtastningsmetode, anvendte miljøvariable på en usikker måde, hvilket kunne udnyttes til at udføre vilkårlig kode.

I den stabile distribution (etch) er dette problem rettet i version 3.0.4-11etch1.

I den ustabile distribution (sid) vil dette problem snart blive rettet.

Vi anbefaler at du opgraderer din unicon-imc2-pakke.

Rettet i:

Debian GNU/Linux 4.0 (etch)

Kildekode:
http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.diff.gz
http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4.orig.tar.gz
http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch1.dsc
Alpha:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_arm.deb
HPPA:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_ia64.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch1_sparc.deb

MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.