Debian Security Advisory
DSA-085-1 nvi -- Format string vulnerability
- Date Reported:
- 20 Oct 2001
- Affected Packages:
- nvi, nvi-m17n
- Vulnerable:
- Yes
- Security database references:
- No other external database security references currently available.
- More information:
-
Takeshi Uno found a very stupid format string vulnerability in all
versions of nvi (in both, the plain and the multilingualized version).
When a filename is saved, it ought to get displayed on the screen.
The routine handling this didn't escape format strings.
This problem has been fixed in version 1.79-16a.1 for nvi and 1.79+19991117-2.3 for nvi-m17n for the stable Debian GNU/Linux 2.2.
Even if we don't believe that this could lead into somebody gaining access of another users account if they haven't lost their brain, we recommend that you upgrade your nvi packages.
- Fixed in:
-
Debian GNU/Linux 2.2 (potato)
- Source:
- http://security.debian.org/dists/stable/updates/main/source/nvi-m17n_1.79+19991117-2.3.diff.gz
- http://security.debian.org/dists/stable/updates/main/source/nvi-m17n_1.79+19991117-2.3.dsc
- http://security.debian.org/dists/stable/updates/main/source/nvi-m17n_1.79+19991117.orig.tar.gz
- http://security.debian.org/dists/stable/updates/main/source/nvi_1.79-16a.1.diff.gz
- http://security.debian.org/dists/stable/updates/main/source/nvi_1.79-16a.1.dsc
- http://security.debian.org/dists/stable/updates/main/source/nvi_1.79.orig.tar.gz
- http://security.debian.org/dists/stable/updates/main/source/nvi-m17n_1.79+19991117-2.3.dsc
- Architecture-independent component:
- http://security.debian.org/dists/stable/updates/main/binary-all/nvi-m17n-common_1.79+19991117-2.3_all.deb
- Alpha:
- http://security.debian.org/dists/stable/updates/main/binary-alpha/nvi-m17n-canna_1.79+19991117-2.3_alpha.deb
- http://security.debian.org/dists/stable/updates/main/binary-alpha/nvi-m17n_1.79+19991117-2.3_alpha.deb
- http://security.debian.org/dists/stable/updates/main/binary-alpha/nvi_1.79-16a.1_alpha.deb
- http://security.debian.org/dists/stable/updates/main/binary-alpha/nvi-m17n_1.79+19991117-2.3_alpha.deb
- ARM:
- http://security.debian.org/dists/stable/updates/main/binary-arm/nvi-m17n-canna_1.79+19991117-2.3_arm.deb
- http://security.debian.org/dists/stable/updates/main/binary-arm/nvi-m17n_1.79+19991117-2.3_arm.deb
- http://security.debian.org/dists/stable/updates/main/binary-arm/nvi_1.79-16a.1_arm.deb
- http://security.debian.org/dists/stable/updates/main/binary-arm/nvi-m17n_1.79+19991117-2.3_arm.deb
- Intel ia32:
- http://security.debian.org/dists/stable/updates/main/binary-i386/nvi-m17n-canna_1.79+19991117-2.3_i386.deb
- http://security.debian.org/dists/stable/updates/main/binary-i386/nvi-m17n_1.79+19991117-2.3_i386.deb
- http://security.debian.org/dists/stable/updates/main/binary-i386/nvi_1.79-16a.1_i386.deb
- http://security.debian.org/dists/stable/updates/main/binary-i386/nvi-m17n_1.79+19991117-2.3_i386.deb
- Motorola 680x0:
- http://security.debian.org/dists/stable/updates/main/binary-m68k/nvi-m17n-canna_1.79+19991117-2.3_m68k.deb
- http://security.debian.org/dists/stable/updates/main/binary-m68k/nvi-m17n_1.79+19991117-2.3_m68k.deb
- http://security.debian.org/dists/stable/updates/main/binary-m68k/nvi_1.79-16a.1_m68k.deb
- http://security.debian.org/dists/stable/updates/main/binary-m68k/nvi-m17n_1.79+19991117-2.3_m68k.deb
- PowerPC:
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/nvi-m17n-canna_1.79+19991117-2.3_powerpc.deb
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/nvi-m17n_1.79+19991117-2.3_powerpc.deb
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/nvi_1.79-16a.1_powerpc.deb
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/nvi-m17n_1.79+19991117-2.3_powerpc.deb
- Sun Sparc:
- http://security.debian.org/dists/stable/updates/main/binary-sparc/nvi-m17n-canna_1.79+19991117-2.3_sparc.deb
- http://security.debian.org/dists/stable/updates/main/binary-sparc/nvi-m17n_1.79+19991117-2.3_sparc.deb
- http://security.debian.org/dists/stable/updates/main/binary-sparc/nvi_1.79-16a.1_sparc.deb
- http://security.debian.org/dists/stable/updates/main/binary-sparc/nvi-m17n_1.79+19991117-2.3_sparc.deb
MD5 checksums of the listed files are available in the original advisory.