Debian Security Advisory
DSA-289-1 rinetd -- incorrect memory resizing
- Date Reported:
- 17 Apr 2003
- Affected Packages:
- rinetd
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 7377.
In Mitre's CVE dictionary: CVE-2003-0212. - More information:
-
Sam Hocevar discovered a security problem in rinetd, an IP connection redirection server. When the connection list is full, rinetd resizes the list in order to store the new incoming connection. However, this is done improperly, resulting in a denial of service and potentially execution of arbitrary code.
For the stable distribution (woody) this problem has been fixed in version 0.61-1.1.
For the old stable distribution (potato) this problem has been fixed in version 0.52-2.1.
For the unstable distribution (sid) this problem has been fixed in version 0.61-2
We recommend that you upgrade your rinetd package.
- Fixed in:
-
Debian GNU/Linux 2.2 (potato)
- Source:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.52-2.1.dsc
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.52-2.1.diff.gz
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.52.orig.tar.gz
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.52-2.1.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.52-2.1_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.52-2.1_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.52-2.1_i386.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.52-2.1_m68k.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.52-2.1_powerpc.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.52-2.1_sparc.deb
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1.dsc
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1.diff.gz
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61.orig.tar.gz
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/r/rinetd/rinetd_0.61-1.1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.