Linux Security
    Linux Security
    Linux Security

    Debian: New affix packages fix remote command execution

    Posted By
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 796-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                              Michael Stone
    September 1st, 2005           
    - --------------------------------------------------------------------------
    Package        : affix
    Vulnerability  : remote command execution
    Problem-Type   : unsafe use of popen
    Debian-specific: no
    CVE ID         : CAN-2005-2716
    Kevin Finisterre reports that affix, a package used to manage
    bluetooth sessions under Linux, uses the popen call in an unsafe
    fashion. A remote attacker can exploit this vulnerability to execute
    arbitrary commands on a vulnerable system.
    The old stable distribution (woody) does not contain the affix
    For the stable distribution (sarge) this problem has been fixed in
    version 2.1.1-3.
    For the unstable distribution (sid) this problem has been fixed in
    version 2.1.2-3.
    We recommend that you upgrade your affix package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:    81959 0914c96291c7bf8a4bbf5d05e5dc74c5
          Size/MD5 checksum:      669 616d043f1c72b3a8ebcae37e4a59fb98
      alpha architecture (DEC Alpha)
          Size/MD5 checksum:    93462 a3569622764735b1b09829e575c34a04
          Size/MD5 checksum:    75608 7d0d72ed495c904ca7820624fc66b8b5
          Size/MD5 checksum:   103142 b534a5fbf6f1537456917fe45c5c8c58
      amd64 architecture (AMD x86_64 (AMD64))
          Size/MD5 checksum:    93480 dead16d09da75e9628bae0d3a61cb04d
          Size/MD5 checksum:    64450 ef7ec29b46f95b5255e9ad23243a117c
          Size/MD5 checksum:    71796 0b83fbb8796d06867c26a197393cdbed
      arm architecture (ARM)
          Size/MD5 checksum:    85908 0e58ede6488bd4e9bd3dd4a06201ac7e
          Size/MD5 checksum:    69546 1fb4f727a1215a89fd4e998fc56d1f26
          Size/MD5 checksum:    56844 837b30e2112981a65327993f242d2e62
      hppa architecture (HP PA RISC)
          Size/MD5 checksum:    76626 a701325fa8e52d04da9044b90cf2be5e
          Size/MD5 checksum:    95006 80e8960c60548492a66c6642d9977e82
          Size/MD5 checksum:    68558 a869b9ae8172cb4a2616e500dc3ba34d
      i386 architecture (Intel ia32)
          Size/MD5 checksum:    63360 e98b76db0c1be17fd0a0fad388580e28
          Size/MD5 checksum:    59644 6c1a4dde54ea88022052473c1385418d
          Size/MD5 checksum:    84952 87f0ced911c009e8cad63b1f1f517e0d
      ia64 architecture (Intel ia64)
          Size/MD5 checksum:    93934 95cd1df0416297d184cf5f8a2fd8e6ff
          Size/MD5 checksum:    83676 8eb81855b4e75cc1690cbea79569cceb
          Size/MD5 checksum:   122328 317969cdc70be9a42632329472b425f8
      m68k architecture (Motorola Mc680x0)
          Size/MD5 checksum:    80118 ec2c0265cb1068d676bb0e5dbadeb199
          Size/MD5 checksum:    58458 76faca4c3f9a94e34398927d5024991f
          Size/MD5 checksum:    54970 45bd12213859c4212baf4d1a127d0916
      mips architecture (MIPS (Big Endian))
          Size/MD5 checksum:    97566 1d8e834bd41fb7f062f47c975f25bcb8
          Size/MD5 checksum:    61378 918a6064f35db1800f03529ae32d6ed9
          Size/MD5 checksum:    76436 ee779d182b774efcf033a159a3e1d337
      mipsel architecture (MIPS (Little Endian))
          Size/MD5 checksum:    97296 8c445a7e88c489d53b0f52c46e9d0a50
          Size/MD5 checksum:    76320 32e64b4ee8452a037efc17ec02e6315f
          Size/MD5 checksum:    61012 717b6b4c932547467802ff042948fe08
      powerpc architecture (PowerPC)
          Size/MD5 checksum:    65466 15e4ae116669a5c3431edeed01439790
          Size/MD5 checksum:    94880 8af910d14455e555e6cb5840830c5724
          Size/MD5 checksum:    70092 03882f73d1876f72b3bd8034b20f3f71
      s390 architecture (IBM S/390)
          Size/MD5 checksum:    73034 d1a72f0d825afd50bbbe65d03ac4f492
          Size/MD5 checksum:    66810 3f8535a792cebdd817ff27c3a2dacd5a
          Size/MD5 checksum:    92464 bd4141e5726e01b520b8766e3e1fabdd
      sparc architecture (Sun SPARC/UltraSPARC)
          Size/MD5 checksum:    84816 2b20cbbc4020bad007a38bb8bd69718d
          Size/MD5 checksum:    66094 ae3660011a4422011ce0f202af218f09
          Size/MD5 checksum:    57762 00bdb8e55e4a68cb8675b0220947d423
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"125","title":"Yes","votes":"43","type":"x","order":"1","pct":82.69,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":17.31,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.