Debians sikkerhedsbulletin

DSA-416-1 fsp -- bufferoverløb, mappegennemløb

Rapporteret den:
6. jan 2004
Berørte pakker:
fsp
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Bugtraq-databasen (hos SecurityFocus): BugTraq-id 9377.
I Mitres CVE-ordbog: CVE-2003-1022, CVE-2004-0011.
Yderligere oplysninger:

En sårbarhed er opdaget i fsp, klientværktøjer til File Service Protocol (FSP), hvorved en fjernbruger både kunne smutte ud af FSPs rootmappe (CAN-2003-1022) og også få en fastlængde-buffer til at løbe over så der kunne udføres vilkårlig kode (CAN-2004-0011).

I den nuværende stabile distribution (woody) er dette problem rettet i version 2.81.b3-3.1woody1.

I den ustabile distribution, er dette problem rettet i version 2.81.b18-1.

Vi anbefaler at du opdaterer din fsp-pakke.

Rettet i:

Debian GNU/Linux 3.0 (woody)

Kildekode:
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1.dsc
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1.diff.gz
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1_alpha.deb
http://security.debian.org/pool/updates/main/f/fsp/fspd_2.81.b3-3.1woody1_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1_arm.deb
http://security.debian.org/pool/updates/main/f/fsp/fspd_2.81.b3-3.1woody1_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1_i386.deb
http://security.debian.org/pool/updates/main/f/fsp/fspd_2.81.b3-3.1woody1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1_ia64.deb
http://security.debian.org/pool/updates/main/f/fsp/fspd_2.81.b3-3.1woody1_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1_hppa.deb
http://security.debian.org/pool/updates/main/f/fsp/fspd_2.81.b3-3.1woody1_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1_m68k.deb
http://security.debian.org/pool/updates/main/f/fsp/fspd_2.81.b3-3.1woody1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1_mips.deb
http://security.debian.org/pool/updates/main/f/fsp/fspd_2.81.b3-3.1woody1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1_mipsel.deb
http://security.debian.org/pool/updates/main/f/fsp/fspd_2.81.b3-3.1woody1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1_powerpc.deb
http://security.debian.org/pool/updates/main/f/fsp/fspd_2.81.b3-3.1woody1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1_s390.deb
http://security.debian.org/pool/updates/main/f/fsp/fspd_2.81.b3-3.1woody1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/f/fsp/fsp_2.81.b3-3.1woody1_sparc.deb
http://security.debian.org/pool/updates/main/f/fsp/fspd_2.81.b3-3.1woody1_sparc.deb

MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.