Debian Security Advisory

DSA-796-1 affix -- remote command execution

Date Reported:
01 Sep 2005
Affected Packages:
affix
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2005-2716.
More information:

Kevin Finisterre reports that affix, a package used to manage bluetooth sessions under Linux, uses the popen call in an unsafe fashion. A remote attacker can exploit this vulnerability to execute arbitrary commands on a vulnerable system.

The old stable distribution (woody) does not contain the affix package.

For the stable distribution (sarge) this problem has been fixed in version 2.1.1-3.

For the unstable distribution (sid) this problem has been fixed in version 2.1.2-3.

We recommend that you upgrade your affix package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3.diff.gz
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3.dsc
Alpha:
http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-3_alpha.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-3_alpha.deb
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3_amd64.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-3_amd64.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-3_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3_arm.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-3_arm.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-3_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-3_hppa.deb
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3_hppa.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-3_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-3_i386.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-3_i386.deb
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-3_ia64.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-3_ia64.deb
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3_ia64.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3_m68k.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-3_m68k.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-3_m68k.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3_mips.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-3_mips.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-3_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3_mipsel.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-3_mipsel.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-3_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-3_powerpc.deb
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3_powerpc.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-3_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-3_s390.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-3_s390.deb
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-3_sparc.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-3_sparc.deb
http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-3_sparc.deb

MD5 checksums of the listed files are available in the original advisory.