Linux Security
    Linux Security
    Linux Security

    Debian: New firebird2 packages fix denial of service

    Date 22 Mar 2006
    Posted By LinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1014-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    March 23rd, 2006              
    - --------------------------------------------------------------------------
    Package        : firebird2
    Vulnerability  : buffer overflow
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2004-2043
    BugTraq ID     : 10446
    Debian Bug     : 357580
    Aviram Jenik and Damyan Ivanov discovered a buffer overflow in
    firebird2, an RDBMS based on InterBase 6.0 code, that allows remote
    attackers to crash.
    The old stable distribution (woody) does not contain firebird2 packages.
    For the stable distribution (sarge) this problem has been fixed in
    version 1.5.1-4sarge1.
    For the unstable distribution (sid) this problem has been fixed in
    We recommend that you upgrade your firebird2 packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:     1062 ef652b5e7bcdb96d3225a9c89dc49d04
          Size/MD5 checksum:    62850 cf98054d0eaf1645152472422d7af90f
          Size/MD5 checksum:  7086993 6f8b02abb15c42959dd4b2246ac457f7
      Intel IA-32 architecture:
          Size/MD5 checksum:   279582 0b0aeb8bdb066a5553a11bb809dad2bf
          Size/MD5 checksum:   252430 eed67eb369a1138e13429d2f681a295b
          Size/MD5 checksum:   306464 08e60d8f5dc90778c191a59065bc9669
          Size/MD5 checksum:   553492 d14ee56363b30bfb24bcfd96557a68cc
          Size/MD5 checksum:  1128322 69b5f3bb509d5e6106d8c4435811c35c
          Size/MD5 checksum:   806716 cca7a990bf6e780e75202d720f1262ed
          Size/MD5 checksum:   833590 54476cbfee6665095cdb53d7d9f1af14
          Size/MD5 checksum:  1206698 15789a38826defd8b7c1fd8495cbee0e
          Size/MD5 checksum:   360926 5c813ee2caf36482f66164759b8dadbb
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"13","type":"x","order":"1","pct":33.33,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"8","type":"x","order":"2","pct":20.51,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"18","type":"x","order":"3","pct":46.15,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.