Linux Security
    Linux Security
    Linux Security

    Debian: neon Format string vulnerability

    Posted By
    These vulnerabilities could exploited by a malicious WebDAV server to execute arbitrary code with libneon's privileges.
    Debian Security Advisory DSA 487-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Matt Zimmerman
    April 16th, 2004                
    - --------------------------------------------------------------------------
    Package        : neon
    Vulnerability  : format string
    Problem-Type   : remote
    Debian-specific: no
    CVE Ids        : CAN-2004-0179
    Multiple format string vulnerabilities were discovered in neon, an
    HTTP and WebDAV client library.  These vulnerabilities could
    potentially be exploited by a malicious WebDAV server to execute
    arbitrary code with the privileges of the process using libneon.
    For the current stable distribution (woody) these problems have been
    fixed in version 0.19.3-2woody3.
    For the unstable distribution (sid), these problems have been fixed in
    version 0.24.5-1.
    We recommend that you update your neon package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      582 4753d19632b3ba69e7d97f61b21da8b1
          Size/MD5 checksum:     4081 6ed8f310baae56db47a34f3affdf0dd5
          Size/MD5 checksum:   499574 9dbb8c276e5fc58a707b6e908abdce63
      Alpha architecture:
          Size/MD5 checksum:   122054 f8455a4aca0ad0eed97b8635f7552ecc
          Size/MD5 checksum:    77894 12283440f135e0b68b328151c78d5240
      ARM architecture:
          Size/MD5 checksum:   100820 6ac65c11b484429f9f388ae0bab9136c
          Size/MD5 checksum:    70256 d16830700754df93ec06fcc72d952be6
      Intel IA-32 architecture:
          Size/MD5 checksum:    94820 7a7f0c168b101390a619ffde40f9efc3
          Size/MD5 checksum:    65780 b72a10b0dbcbfb149b36b3053627a9d2
      Intel IA-64 architecture:
          Size/MD5 checksum:   131246 dda199f3b1d6598bb8aa2f6ba37521d4
          Size/MD5 checksum:    96250 043f6b4d3eb394bcaa2b7dda6a78b676
      HP Precision architecture:
          Size/MD5 checksum:   118574 d7904398181654ebc8eab408a2d96cec
          Size/MD5 checksum:    80776 fdb1f1e337ee50318cbccfeeda0ec32f
      Motorola 680x0 architecture:
          Size/MD5 checksum:    93110 7993e9e642cbefb27ea6a7085615bb55
          Size/MD5 checksum:    67668 fc37364b5b44454a637b69b591ce8c04
      Big endian MIPS architecture:
          Size/MD5 checksum:   110704 3fbe497c5ac44aee13457fcfe9b785cf
          Size/MD5 checksum:    68644 29c7188a9dfe0da26a218eea6714997b
      Little endian MIPS architecture:
          Size/MD5 checksum:   110502 73eb5e6338f9ce6f5fd0c0cd27cbac48
          Size/MD5 checksum:    68626 f85bcdab3e2957d53f00569966eaa3b6
      PowerPC architecture:
          Size/MD5 checksum:   107168 c1994dba85b7e2150b1419fd4da44a14
          Size/MD5 checksum:    71544 5e1812c5242835b7567d3549a334d9d8
      IBM S/390 architecture:
          Size/MD5 checksum:    96930 022ad2200a279efc9ab1482e599b47d3
          Size/MD5 checksum:    70958 632017c6cd495f5a35a3ced63f2bab88
      Sun Sparc architecture:
          Size/MD5 checksum:   102406 d3e5c72b6de6f90f2272c62d4ee3c88c
          Size/MD5 checksum:    70812 c36ba230074c19cb6a58b76da986767d
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and


    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"125","title":"Yes","votes":"43","type":"x","order":"1","pct":82.69,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":17.31,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.