Debian Security Advisory
DSA-375-1 node -- buffer overflow, format string
- Date Reported:
- 29 Aug 2003
- Affected Packages:
- node
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 8512.
In Mitre's CVE dictionary: CVE-2003-0707, CVE-2003-0708. - More information:
-
Morgan alias SM6TKY discovered and fixed several security related problems in LinuxNode, an Amateur Packet Radio Node program. The buffer overflow he discovered can be used to gain unauthorised root access and can be remotely triggered.
For the stable distribution (woody) this problem has been fixed in version 0.3.0a-2woody1.
For the unstable distribution (sid) this problem has been fixed in version 0.3.2-1.
We recommend that you upgrade your node packages immediately.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1.dsc
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1.diff.gz
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a.orig.tar.gz
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.