Debian Security Advisory
DSA-1664-1 ekg -- missing input sanitising
- Date Reported:
- 10 Nov 2008
- Affected Packages:
- ekg
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2008-4776.
- More information:
-
It was discovered that ekg, a console Gadu Gadu client performs insufficient input sanitising in the code to parse contact descriptions, which may result in denial of service.
For the stable distribution (etch), this problem has been fixed in version 1:1.7~rc2-1etch2.
For the unstable distribution (sid) and the upcoming stable distribution (lenny), this problem has been fixed in version 1:1.8~rc1-2 of libgadu.
We recommend that you upgrade your ekg package.
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2.diff.gz
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2.orig.tar.gz
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2.dsc
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2.orig.tar.gz
- Alpha:
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_alpha.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_alpha.deb
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_alpha.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_amd64.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_amd64.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_amd64.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_arm.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_arm.deb
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_arm.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_arm.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_hppa.deb
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_hppa.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_hppa.deb
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_i386.deb
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_i386.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_i386.deb
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_ia64.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_ia64.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_ia64.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_ia64.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_mips.deb
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_mips.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_mips.deb
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_mips.deb
- Little-endian MIPS:
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_mipsel.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_mipsel.deb
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_mipsel.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_powerpc.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_powerpc.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_powerpc.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_s390.deb
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_s390.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_s390.deb
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch2_sparc.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_sparc.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch2_sparc.deb
- http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch2_sparc.deb
MD5 checksums of the listed files are available in the original advisory.