Debian: mikmod buffer overflow vulnerability

    Date16 Jun 2003
    CategoryDebian
    2203
    Posted ByLinuxSecurity Advisories
    Ingo Saitz discovered a bug in mikmod whereby a long filename inside an archive file can overflow a buffer when the archive is being read by mikmod.
    
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 320-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Matt Zimmerman
    June 13th, 2003                          http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : mikmod
    Vulnerability  : buffer overflow
    Problem-Type   : local
    Debian-specific: no
    CVE Id         : CAN-2003-0427
    
    Ingo Saitz discovered a bug in mikmod whereby a long filename inside
    an archive file can overflow a buffer when the archive is being read
    by mikmod.
    
    For the stable distribution (woody) this problem has been fixed in
    version 3.1.6-4woody3.
    
    For old stable distribution (potato) this problem has been fixed in
    version 3.1.6-2potato3.
    
    For the unstable distribution (sid) this problem is fixed in version
    3.1.6-6.
    
    We recommend that you update your mikmod package.
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    Debian GNU/Linux 2.2 alias potato
    - ---------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3.dsc
          Size/MD5 checksum:      595 d0a811016b5025b327eea822373f12d5
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3.diff.gz
          Size/MD5 checksum:     6207 2ce7c29ac4c12632de56a1db093982f7
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6.orig.tar.gz
          Size/MD5 checksum:   134827 71d8142ae3ae27034535913e906b1384
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3_alpha.deb
          Size/MD5 checksum:    62968 0c0d4ff734a7c02e4d8c862bb3745713
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3_arm.deb
          Size/MD5 checksum:    52588 7d5da70323e8549fc7cf5528173f3d1d
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3_i386.deb
          Size/MD5 checksum:    50666 f00f6100852c6a25be4909e861368877
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3_m68k.deb
          Size/MD5 checksum:    48942 390d71cc5d5f98e84e077961740b9608
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3_powerpc.deb
          Size/MD5 checksum:    53578 ef6419433633f01244eafeb7b61d0e6c
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3_sparc.deb
          Size/MD5 checksum:    54836 ca9367c16507f4ed6d247cc7001d777a
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3.dsc
          Size/MD5 checksum:      608 b52405fb77329efddae915e145a9751d
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3.diff.gz
          Size/MD5 checksum:     9726 35080e8530e9924be4d86aafbd31b84d
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6.orig.tar.gz
          Size/MD5 checksum:   134827 71d8142ae3ae27034535913e906b1384
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_alpha.deb
          Size/MD5 checksum:    62712 fe5456aa0ca7a1819fd1bb87b82bde1a
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_arm.deb
          Size/MD5 checksum:    52602 d75974481a2b2e23c47a7f700bf878e5
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_i386.deb
          Size/MD5 checksum:    50578 fde5b864a91bdddf1b07720af26cf5d5
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_ia64.deb
          Size/MD5 checksum:    76108 ad1cbef734d43f5e0fa5bad3c7f1cd72
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_hppa.deb
          Size/MD5 checksum:    58482 9edb50e45214bc0b3225f5070df2b59f
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_m68k.deb
          Size/MD5 checksum:    48554 a52f8913418501bf6a4b103e14636436
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_mips.deb
          Size/MD5 checksum:    57352 4edbef3712ec7220cdbe410c61aa8406
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_mipsel.deb
          Size/MD5 checksum:    57538 f0846374f89bc626f6ed29fd82bbd4af
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_powerpc.deb
          Size/MD5 checksum:    53758 9a8e2a41cf260e5eecfd0472f2f574e6
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_s390.deb
          Size/MD5 checksum:    53038 bddc8a9dcdea2b4386b5d5a4b3d281e1
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_sparc.deb
          Size/MD5 checksum:    52786 9da2c9dc87e8c9d742483e5929c2e90f
    
    
    These files will probably be moved into the stable distribution on its
    next revision.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"22","type":"x","order":"1","pct":55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":32.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.