Debian: neon Format string vulnerability

    Date17 Apr 2004
    CategoryDebian
    2003
    Posted ByLinuxSecurity Advisories
    These vulnerabilities could exploited by a malicious WebDAV server to execute arbitrary code with libneon's privileges.
    
    Debian Security Advisory DSA 487-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Matt Zimmerman
    April 16th, 2004                          http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : neon
    Vulnerability  : format string
    Problem-Type   : remote
    Debian-specific: no
    CVE Ids        : CAN-2004-0179
    
    Multiple format string vulnerabilities were discovered in neon, an
    HTTP and WebDAV client library.  These vulnerabilities could
    potentially be exploited by a malicious WebDAV server to execute
    arbitrary code with the privileges of the process using libneon.
    
    For the current stable distribution (woody) these problems have been
    fixed in version 0.19.3-2woody3.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 0.24.5-1.
    
    We recommend that you update your neon package.
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/n/neon/neon_0.19.3-2woody3.dsc
          Size/MD5 checksum:      582 4753d19632b3ba69e7d97f61b21da8b1
         http://security.debian.org/pool/updates/main/n/neon/neon_0.19.3-2woody3.diff.gz
          Size/MD5 checksum:     4081 6ed8f310baae56db47a34f3affdf0dd5
         http://security.debian.org/pool/updates/main/n/neon/neon_0.19.3.orig.tar.gz
          Size/MD5 checksum:   499574 9dbb8c276e5fc58a707b6e908abdce63
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_alpha.deb
          Size/MD5 checksum:   122054 f8455a4aca0ad0eed97b8635f7552ecc
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_alpha.deb
          Size/MD5 checksum:    77894 12283440f135e0b68b328151c78d5240
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_arm.deb
          Size/MD5 checksum:   100820 6ac65c11b484429f9f388ae0bab9136c
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_arm.deb
          Size/MD5 checksum:    70256 d16830700754df93ec06fcc72d952be6
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_i386.deb
          Size/MD5 checksum:    94820 7a7f0c168b101390a619ffde40f9efc3
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_i386.deb
          Size/MD5 checksum:    65780 b72a10b0dbcbfb149b36b3053627a9d2
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_ia64.deb
          Size/MD5 checksum:   131246 dda199f3b1d6598bb8aa2f6ba37521d4
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_ia64.deb
          Size/MD5 checksum:    96250 043f6b4d3eb394bcaa2b7dda6a78b676
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_hppa.deb
          Size/MD5 checksum:   118574 d7904398181654ebc8eab408a2d96cec
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_hppa.deb
          Size/MD5 checksum:    80776 fdb1f1e337ee50318cbccfeeda0ec32f
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_m68k.deb
          Size/MD5 checksum:    93110 7993e9e642cbefb27ea6a7085615bb55
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_m68k.deb
          Size/MD5 checksum:    67668 fc37364b5b44454a637b69b591ce8c04
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_mips.deb
          Size/MD5 checksum:   110704 3fbe497c5ac44aee13457fcfe9b785cf
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_mips.deb
          Size/MD5 checksum:    68644 29c7188a9dfe0da26a218eea6714997b
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_mipsel.deb
          Size/MD5 checksum:   110502 73eb5e6338f9ce6f5fd0c0cd27cbac48
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_mipsel.deb
          Size/MD5 checksum:    68626 f85bcdab3e2957d53f00569966eaa3b6
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_powerpc.deb
          Size/MD5 checksum:   107168 c1994dba85b7e2150b1419fd4da44a14
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_powerpc.deb
          Size/MD5 checksum:    71544 5e1812c5242835b7567d3549a334d9d8
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_s390.deb
          Size/MD5 checksum:    96930 022ad2200a279efc9ab1482e599b47d3
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_s390.deb
          Size/MD5 checksum:    70958 632017c6cd495f5a35a3ced63f2bab88
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_sparc.deb
          Size/MD5 checksum:   102406 d3e5c72b6de6f90f2272c62d4ee3c88c
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_sparc.deb
          Size/MD5 checksum:    70812 c36ba230074c19cb6a58b76da986767d
    
      These files will probably be moved into the stable distribution on
      its next revision.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"67","type":"x","order":"1","pct":57.26,"resources":[]},{"id":"88","title":"Should be more technical","votes":"16","type":"x","order":"2","pct":13.68,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.06,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.