Linux Security
Linux Security
Linux Security

Debian: New firebird2 packages fix denial of service

Date 22 Mar 2006
Posted By LinuxSecurity Advisories
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1014-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
March 23rd, 2006              
- --------------------------------------------------------------------------

Package        : firebird2
Vulnerability  : buffer overflow
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2004-2043
BugTraq ID     : 10446
Debian Bug     : 357580

Aviram Jenik and Damyan Ivanov discovered a buffer overflow in
firebird2, an RDBMS based on InterBase 6.0 code, that allows remote
attackers to crash.

The old stable distribution (woody) does not contain firebird2 packages.

For the stable distribution (sarge) this problem has been fixed in
version 1.5.1-4sarge1.

For the unstable distribution (sid) this problem has been fixed in

We recommend that you upgrade your firebird2 packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:     1062 ef652b5e7bcdb96d3225a9c89dc49d04
      Size/MD5 checksum:    62850 cf98054d0eaf1645152472422d7af90f
      Size/MD5 checksum:  7086993 6f8b02abb15c42959dd4b2246ac457f7

  Intel IA-32 architecture:
      Size/MD5 checksum:   279582 0b0aeb8bdb066a5553a11bb809dad2bf
      Size/MD5 checksum:   252430 eed67eb369a1138e13429d2f681a295b
      Size/MD5 checksum:   306464 08e60d8f5dc90778c191a59065bc9669
      Size/MD5 checksum:   553492 d14ee56363b30bfb24bcfd96557a68cc
      Size/MD5 checksum:  1128322 69b5f3bb509d5e6106d8c4435811c35c
      Size/MD5 checksum:   806716 cca7a990bf6e780e75202d720f1262ed
      Size/MD5 checksum:   833590 54476cbfee6665095cdb53d7d9f1af14
      Size/MD5 checksum:  1206698 15789a38826defd8b7c1fd8495cbee0e
      Size/MD5 checksum:   360926 5c813ee2caf36482f66164759b8dadbb

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"42","type":"x","order":"1","pct":84,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"4","type":"x","order":"2","pct":8,"resources":[]},{"id":"181","title":"Hardly ever","votes":"4","type":"x","order":"3","pct":8,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.