Debians sikkerhedsbulletin

DSA-493-1 xchat -- bufferoverløb

Rapporteret den:
21. apr 2004
Berørte pakker:
xchat
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Debians fejlsporingssystem: Fejl 244184.
I Mitres CVE-ordbog: CVE-2004-0409.
Yderligere oplysninger:

Der er opdaget et bufferoverløb i Socks-5-proxykoden i XChat, an IRC-klient til X som ligner AmIRC. Dette gør det muligt for en angriber at udføre vilkårlig kode på brugerens maskine.

I den stabile distribution (woody) er dette problem rettet i version 1.8.9-0woody3.

I den ustabile distribution (sid) er dette problem rettet i version 2.0.8-1.

Vi anbefaler at du opgraderer dine xchat- og relaterede pakker.

Rettet i:

Debian GNU/Linux 3.0 (woody)

Kildekode:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3.dsc
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3.diff.gz
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9.orig.tar.gz
Arkitekturuafhængig komponent:
http://security.debian.org/pool/updates/main/x/xchat/xchat-common_1.8.9-0woody3_all.deb
Alpha:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_alpha.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_alpha.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_arm.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_arm.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_i386.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_i386.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_ia64.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_ia64.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_hppa.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_hppa.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_m68k.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_m68k.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_mips.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_mips.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_mipsel.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_mipsel.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_powerpc.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_powerpc.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_s390.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_s390.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_sparc.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_sparc.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_sparc.deb

MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.