Debian: neon Heap overflow vulnerability

    Date19 May 2004
    CategoryDebian
    2217
    Posted ByLinuxSecurity Advisories
    User input is copied into variables not large enough for all cases. This can lead to an overflow of a static heap variable.
    
    Debian Security Advisory DSA 506-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Martin Schulze
    May 19th, 2004                           http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : neon
    Vulnerability  : buffer overflow
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2004-0398
    
    Stefan Esser discovered a problem in neon, an HTTP and WebDAV client
    library.  User input is copied into variables not large enough for all
    cases.  This can lead to an overflow of a static heap variable.
    
    For the stable distribution (woody) this problem has been fixed in
    version 0.19.3-2woody5.
    
    For the unstable distribution (sid) this problem has been fixed in
    version 0.23.9.dfsg-2 and neon_0.24.6.dfsg-1.
    
    We recommend that you upgrade your libneon* packages.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/n/neon/neon_0.19.3-2woody5.dsc
          Size/MD5 checksum:      582 3d56a54cb45ab8f3d4362b7c6d77162a
         http://security.debian.org/pool/updates/main/n/neon/neon_0.19.3-2woody5.diff.gz
          Size/MD5 checksum:     4590 fbf528e0831e4889cc0494b4be900f51
         http://security.debian.org/pool/updates/main/n/neon/neon_0.19.3.orig.tar.gz
          Size/MD5 checksum:   499574 9dbb8c276e5fc58a707b6e908abdce63
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_alpha.deb
          Size/MD5 checksum:   122312 d31561604a3da54a6cae7f2ccd612828
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_alpha.deb
          Size/MD5 checksum:    78170 37abde4cbeda1ce079b05d2b8bf9c955
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_arm.deb
          Size/MD5 checksum:   101074 fa3284a7256e294464076c32015137b4
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_arm.deb
          Size/MD5 checksum:    70476 a7e666280fe0a2681baa1e4dd8ba669f
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_i386.deb
          Size/MD5 checksum:    94598 f95ec370b3c047730417982e31c5941f
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_i386.deb
          Size/MD5 checksum:    66520 58ffe032027ccb9c14907bc0c938a28a
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_ia64.deb
          Size/MD5 checksum:   131498 f6258285344c581c08e4926ba0adf0ac
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_ia64.deb
          Size/MD5 checksum:    96528 af653cafe30dd6777297ec06500ba95e
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_hppa.deb
          Size/MD5 checksum:   118810 4b963efbb146e3f26b6a646c4e890399
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_hppa.deb
          Size/MD5 checksum:    81036 0a459c8029dc66c93f1ba7a9aa44e0ee
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_m68k.deb
          Size/MD5 checksum:    93374 f2e3c294a1831f0f7a9fccc6ae49d2d6
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_m68k.deb
          Size/MD5 checksum:    67940 e731dfac9cdae2c6fcd08667aad0d5ae
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_mips.deb
          Size/MD5 checksum:   110964 bd6ba022967dca47da799db51cb589bd
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_mips.deb
          Size/MD5 checksum:    68904 72d371ddb0efe9e1eea03321f16aa9a6
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_mipsel.deb
          Size/MD5 checksum:   110762 cd7257f6c9eeaadec1a3f6e4c34c234b
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_mipsel.deb
          Size/MD5 checksum:    68904 cb7cea103ae298aa36eaa59217407700
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_powerpc.deb
          Size/MD5 checksum:   107422 63e1113ef9dade9dc42d5fac7d957943
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_powerpc.deb
          Size/MD5 checksum:    71764 1b3da349d23b5be195c4242ff7de5ccc
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_s390.deb
          Size/MD5 checksum:    97206 08a7c4289846d8a38e00e7f083d68d6d
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_s390.deb
          Size/MD5 checksum:    71170 729713892e8cd548391cae5833618100
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_sparc.deb
          Size/MD5 checksum:   102684 206203649c4c0192a5216a1815f69fec
         http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_sparc.deb
          Size/MD5 checksum:    71078 a1f82f303e5adc217f4a6e5f1d413140
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.