Debian Security Advisory
DSA-832-1 gopher -- buffer overflows
- Date Reported:
- 30 Sep 2005
- Affected Packages:
- gopher
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2005-2772.
- More information:
-
Several buffer overflows have been discovered in gopher, a text-oriented client for the Gopher Distributed Hypertext protocol, that can be exploited by a malicious Gopher server.
For the old stable distribution (woody) this problem has been fixed in version 3.0.3woody4.
For the stable distribution (sarge) this problem has been fixed in version 3.0.7sarge2.
For the unstable distribution (sid) this problem has been fixed in version 3.0.11.
We recommend that you upgrade your gopher package.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4.dsc
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4.tar.gz
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4.tar.gz
- Alpha:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_alpha.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_alpha.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_arm.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_arm.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_i386.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_i386.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_ia64.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_ia64.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_hppa.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_hppa.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_m68k.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_m68k.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_mips.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_mips.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_mipsel.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_mipsel.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_powerpc.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_powerpc.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_s390.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_s390.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody4_sparc.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_sparc.deb
- http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody4_sparc.deb
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2.dsc
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2.tar.gz
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2.tar.gz
- Alpha:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge2_sparc.deb
MD5 checksums of the listed files are available in the original advisory.