Linux Security
Linux Security
Linux Security

Debian: neon Heap overflow vulnerability

Date 19 May 2004
2357
Posted By LinuxSecurity Advisories
User input is copied into variables not large enough for all cases. This can lead to an overflow of a static heap variable.

Debian Security Advisory DSA 506-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
https://www.debian.org/security/                             Martin Schulze
May 19th, 2004                           https://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : neon
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-0398

Stefan Esser discovered a problem in neon, an HTTP and WebDAV client
library.  User input is copied into variables not large enough for all
cases.  This can lead to an overflow of a static heap variable.

For the stable distribution (woody) this problem has been fixed in
version 0.19.3-2woody5.

For the unstable distribution (sid) this problem has been fixed in
version 0.23.9.dfsg-2 and neon_0.24.6.dfsg-1.

We recommend that you upgrade your libneon* packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

     https://security.debian.org/pool/updates/main/n/neon/neon_0.19.3-2woody5.dsc
      Size/MD5 checksum:      582 3d56a54cb45ab8f3d4362b7c6d77162a
     https://security.debian.org/pool/updates/main/n/neon/neon_0.19.3-2woody5.diff.gz
      Size/MD5 checksum:     4590 fbf528e0831e4889cc0494b4be900f51
     https://security.debian.org/pool/updates/main/n/neon/neon_0.19.3.orig.tar.gz
      Size/MD5 checksum:   499574 9dbb8c276e5fc58a707b6e908abdce63

  Alpha architecture:

     https://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_alpha.deb
      Size/MD5 checksum:   122312 d31561604a3da54a6cae7f2ccd612828
     https://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_alpha.deb
      Size/MD5 checksum:    78170 37abde4cbeda1ce079b05d2b8bf9c955

  ARM architecture:

     https://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_arm.deb
      Size/MD5 checksum:   101074 fa3284a7256e294464076c32015137b4
     https://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_arm.deb
      Size/MD5 checksum:    70476 a7e666280fe0a2681baa1e4dd8ba669f

  Intel IA-32 architecture:

     https://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_i386.deb
      Size/MD5 checksum:    94598 f95ec370b3c047730417982e31c5941f
     https://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_i386.deb
      Size/MD5 checksum:    66520 58ffe032027ccb9c14907bc0c938a28a

  Intel IA-64 architecture:

     https://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_ia64.deb
      Size/MD5 checksum:   131498 f6258285344c581c08e4926ba0adf0ac
     https://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_ia64.deb
      Size/MD5 checksum:    96528 af653cafe30dd6777297ec06500ba95e

  HP Precision architecture:

     https://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_hppa.deb
      Size/MD5 checksum:   118810 4b963efbb146e3f26b6a646c4e890399
     https://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_hppa.deb
      Size/MD5 checksum:    81036 0a459c8029dc66c93f1ba7a9aa44e0ee

  Motorola 680x0 architecture:

     https://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_m68k.deb
      Size/MD5 checksum:    93374 f2e3c294a1831f0f7a9fccc6ae49d2d6
     https://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_m68k.deb
      Size/MD5 checksum:    67940 e731dfac9cdae2c6fcd08667aad0d5ae

  Big endian MIPS architecture:

     https://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_mips.deb
      Size/MD5 checksum:   110964 bd6ba022967dca47da799db51cb589bd
     https://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_mips.deb
      Size/MD5 checksum:    68904 72d371ddb0efe9e1eea03321f16aa9a6

  Little endian MIPS architecture:

     https://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_mipsel.deb
      Size/MD5 checksum:   110762 cd7257f6c9eeaadec1a3f6e4c34c234b
     https://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_mipsel.deb
      Size/MD5 checksum:    68904 cb7cea103ae298aa36eaa59217407700

  PowerPC architecture:

     https://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_powerpc.deb
      Size/MD5 checksum:   107422 63e1113ef9dade9dc42d5fac7d957943
     https://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_powerpc.deb
      Size/MD5 checksum:    71764 1b3da349d23b5be195c4242ff7de5ccc

  IBM S/390 architecture:

     https://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_s390.deb
      Size/MD5 checksum:    97206 08a7c4289846d8a38e00e7f083d68d6d
     https://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_s390.deb
      Size/MD5 checksum:    71170 729713892e8cd548391cae5833618100

  Sun Sparc architecture:

     https://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_sparc.deb
      Size/MD5 checksum:   102684 206203649c4c0192a5216a1815f69fec
     https://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_sparc.deb
      Size/MD5 checksum:    71078 a1f82f303e5adc217f4a6e5f1d413140


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb  https://security.debian.org/ stable/updates main
For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Package info: `apt-cache show ' and  https://packages.debian.org/

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"47","type":"x","order":"1","pct":79.66,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.86,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.47,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.