Linux Security
Linux Security
Linux Security

Debian: New affix packages fix remote command execution

Date 01 Sep 2005
Posted By LinuxSecurity Advisories
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 796-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                              Michael Stone
September 1st, 2005           
- --------------------------------------------------------------------------

Package        : affix
Vulnerability  : remote command execution
Problem-Type   : unsafe use of popen
Debian-specific: no
CVE ID         : CAN-2005-2716

Kevin Finisterre reports that affix, a package used to manage
bluetooth sessions under Linux, uses the popen call in an unsafe
fashion. A remote attacker can exploit this vulnerability to execute
arbitrary commands on a vulnerable system.

The old stable distribution (woody) does not contain the affix

For the stable distribution (sarge) this problem has been fixed in
version 2.1.1-3.

For the unstable distribution (sid) this problem has been fixed in
version 2.1.2-3.

We recommend that you upgrade your affix package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:    81959 0914c96291c7bf8a4bbf5d05e5dc74c5
      Size/MD5 checksum:      669 616d043f1c72b3a8ebcae37e4a59fb98

  alpha architecture (DEC Alpha)
      Size/MD5 checksum:    93462 a3569622764735b1b09829e575c34a04
      Size/MD5 checksum:    75608 7d0d72ed495c904ca7820624fc66b8b5
      Size/MD5 checksum:   103142 b534a5fbf6f1537456917fe45c5c8c58

  amd64 architecture (AMD x86_64 (AMD64))
      Size/MD5 checksum:    93480 dead16d09da75e9628bae0d3a61cb04d
      Size/MD5 checksum:    64450 ef7ec29b46f95b5255e9ad23243a117c
      Size/MD5 checksum:    71796 0b83fbb8796d06867c26a197393cdbed

  arm architecture (ARM)
      Size/MD5 checksum:    85908 0e58ede6488bd4e9bd3dd4a06201ac7e
      Size/MD5 checksum:    69546 1fb4f727a1215a89fd4e998fc56d1f26
      Size/MD5 checksum:    56844 837b30e2112981a65327993f242d2e62

  hppa architecture (HP PA RISC)
      Size/MD5 checksum:    76626 a701325fa8e52d04da9044b90cf2be5e
      Size/MD5 checksum:    95006 80e8960c60548492a66c6642d9977e82
      Size/MD5 checksum:    68558 a869b9ae8172cb4a2616e500dc3ba34d

  i386 architecture (Intel ia32)
      Size/MD5 checksum:    63360 e98b76db0c1be17fd0a0fad388580e28
      Size/MD5 checksum:    59644 6c1a4dde54ea88022052473c1385418d
      Size/MD5 checksum:    84952 87f0ced911c009e8cad63b1f1f517e0d

  ia64 architecture (Intel ia64)
      Size/MD5 checksum:    93934 95cd1df0416297d184cf5f8a2fd8e6ff
      Size/MD5 checksum:    83676 8eb81855b4e75cc1690cbea79569cceb
      Size/MD5 checksum:   122328 317969cdc70be9a42632329472b425f8

  m68k architecture (Motorola Mc680x0)
      Size/MD5 checksum:    80118 ec2c0265cb1068d676bb0e5dbadeb199
      Size/MD5 checksum:    58458 76faca4c3f9a94e34398927d5024991f
      Size/MD5 checksum:    54970 45bd12213859c4212baf4d1a127d0916

  mips architecture (MIPS (Big Endian))
      Size/MD5 checksum:    97566 1d8e834bd41fb7f062f47c975f25bcb8
      Size/MD5 checksum:    61378 918a6064f35db1800f03529ae32d6ed9
      Size/MD5 checksum:    76436 ee779d182b774efcf033a159a3e1d337

  mipsel architecture (MIPS (Little Endian))
      Size/MD5 checksum:    97296 8c445a7e88c489d53b0f52c46e9d0a50
      Size/MD5 checksum:    76320 32e64b4ee8452a037efc17ec02e6315f
      Size/MD5 checksum:    61012 717b6b4c932547467802ff042948fe08

  powerpc architecture (PowerPC)
      Size/MD5 checksum:    65466 15e4ae116669a5c3431edeed01439790
      Size/MD5 checksum:    94880 8af910d14455e555e6cb5840830c5724
      Size/MD5 checksum:    70092 03882f73d1876f72b3bd8034b20f3f71

  s390 architecture (IBM S/390)
      Size/MD5 checksum:    73034 d1a72f0d825afd50bbbe65d03ac4f492
      Size/MD5 checksum:    66810 3f8535a792cebdd817ff27c3a2dacd5a
      Size/MD5 checksum:    92464 bd4141e5726e01b520b8766e3e1fabdd

  sparc architecture (Sun SPARC/UltraSPARC)
      Size/MD5 checksum:    84816 2b20cbbc4020bad007a38bb8bd69718d
      Size/MD5 checksum:    66094 ae3660011a4422011ce0f202af218f09
      Size/MD5 checksum:    57762 00bdb8e55e4a68cb8675b0220947d423

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"64","type":"x","order":"1","pct":76.19,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"13","type":"x","order":"2","pct":15.48,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.