Debian Security Advisory
DSA-012-1 micq -- remote buffer overflow
- Date Reported:
- 22 Jan 2001
- Affected Packages:
- micq
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 2254.
In Mitre's CVE dictionary: CVE-2001-0233. - More information:
- PkC has reported that there is a buffer overflow in
sprintf() in micq versions 0.4.6 and previous, that allows to a remote attacker
able to sniff packets to the ICQ server to execute arbitrary code on the victim
system.
We recommend you upgrade your micq package immediately.
- Fixed in:
-
Debian 2.2 (potato)
- Source:
-
http://security.debian.org/dists/stable/updates/main/source/micq_0.4.3-4.dsc
-
http://security.debian.org/dists/stable/updates/main/source/micq_0.4.3.orig.tar.gz
-
http://security.debian.org/dists/stable/updates/main/source/micq_0.4.3-4.diff.gz
- alpha:
-
http://security.debian.org/dists/stable/updates/main/binary-alpha/micq_0.4.3-4_alpha.deb
- arm:
-
http://security.debian.org/dists/stable/updates/main/binary-arm/micq_0.4.3-4_arm.deb
- i386:
-
http://security.debian.org/dists/stable/updates/main/binary-i386/micq_0.4.3-4_i386.deb
- m68k:
-
http://security.debian.org/dists/stable/updates/main/binary-m68k/micq_0.4.3-4_m68k.deb
- powerpc:
-
http://security.debian.org/dists/stable/updates/main/binary-powerpc/micq_0.4.3-4_powerpc.deb
- sparc:
-
http://security.debian.org/dists/stable/updates/main/binary-sparc/micq_0.4.3-4_sparc.deb