Linux Security
    Linux Security
    Linux Security

    Debian: New libapache-auth-ldap packages fix arbitrary code execution

    Date 27 Jan 2006
    3999
    Posted By Joe Shakespeare
    "Seregorn" discovered a format string vulnerability in the logging function of libapache-auth-ldap, an LDAP authentication module for the Apache webserver, that can lead to the execution of arbitrary code.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 952-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                         Moritz Muehlenhoff
    January 23rd, 2006                      https://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : libapache-auth-ldap
    Vulnerability  : format string
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CVE-2006-0150
    
    "Seregorn" discovered a format string vulnerability in the logging
    function of libapache-auth-ldap, an LDAP authentication module for the
    Apache webserver, that can lead to the execution of arbitrary code.
    
    For the old stable distribution (woody) this problem has been fixed in
    version 1.6.0-3.1.
    
    For the stable distribution (sarge) this problem has been fixed in
    version 1.6.0-8.1
    
    The unstable distribution (sid) does no longer contain libapache-auth-ldap.
    
    We recommend that you upgrade your libapache-auth-ldap package.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1.dsc
          Size/MD5 checksum:      652 6ef1d9323674ef6a5f076b3b65ccf60e
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1.diff.gz
          Size/MD5 checksum:     3927 e8197f2db55a7c9e570ee5f72bc3ff39
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0.orig.tar.gz
          Size/MD5 checksum:    79058 de283639b40e3f359ad6e4a65cad1813
    
      Alpha architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_alpha.deb
          Size/MD5 checksum:    71528 46f26f6c68fa1e900e7c3b4b6f65e83c
    
      ARM architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_arm.deb
          Size/MD5 checksum:    69554 59ed4e025245a4b2397530f165d7a20e
    
      Intel IA-32 architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_i386.deb
          Size/MD5 checksum:    68958 1bded30a2554d58d8a856e61477b42ba
    
      Intel IA-64 architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_ia64.deb
          Size/MD5 checksum:    75804 a7af3cc2e12376a386659e118064efb3
    
      HP Precision architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_hppa.deb
          Size/MD5 checksum:    71264 4ee43bc263b35ec2dd199bfde43d890d
    
      Motorola 680x0 architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_m68k.deb
          Size/MD5 checksum:    69354 ade63074b9f3ff1c6f46ff19262ecf2d
    
      Big endian MIPS architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_mips.deb
          Size/MD5 checksum:    68724 2ffc67d01923a581918344100a8461ae
    
      Little endian MIPS architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_mipsel.deb
          Size/MD5 checksum:    68656 e69c65426f6d102e2da0fa204e8a3b59
    
      PowerPC architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_powerpc.deb
          Size/MD5 checksum:    70020 920814cda6c57190e68160c087b76bea
    
      IBM S/390 architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_s390.deb
          Size/MD5 checksum:    69386 c74da92420df9b49c48f3bd6487d8579
    
      Sun Sparc architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_sparc.deb
          Size/MD5 checksum:    72126 6c28b218349faffe5a8789315b41d212
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1.dsc
          Size/MD5 checksum:      672 823af0881e3fc9ecaaf4ec4de445a2a1
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1.diff.gz
          Size/MD5 checksum:     5015 f3d65a99091bb695e9cdeb6f27c28a1b
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0.orig.tar.gz
          Size/MD5 checksum:    79058 de283639b40e3f359ad6e4a65cad1813
    
      Alpha architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_alpha.deb
          Size/MD5 checksum:    71318 fd007ba23080c94b621351ea8d4c3e2d
    
      AMD64 architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_amd64.deb
          Size/MD5 checksum:    70800 f056405e0dd083eba4e1a97ee972be10
    
      ARM architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_arm.deb
          Size/MD5 checksum:    69298 a6475d8a98ca1687d30367b24fdcdee6
    
      Intel IA-32 architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_i386.deb
          Size/MD5 checksum:    69192 ddce8c4e7958dac6dd637f210f3690ea
    
      Intel IA-64 architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_ia64.deb
          Size/MD5 checksum:    74662 07480ce393dfe2c820cdfed1e09c3fad
    
      HP Precision architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_hppa.deb
          Size/MD5 checksum:    71836 ffb117f0c3b8ca64181509172717441e
    
      Motorola 680x0 architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_m68k.deb
          Size/MD5 checksum:    69592 2d2436f78415a7032b7724ffc94711f2
    
      Big endian MIPS architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_mips.deb
          Size/MD5 checksum:    69240 93eeb7ec212188e9fc66a38100ae0fb2
    
      Little endian MIPS architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_mipsel.deb
          Size/MD5 checksum:    69142 e5d3c43b616478ffea76c6708726436e
    
      PowerPC architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_powerpc.deb
          Size/MD5 checksum:    71252 81e2369976e82a79babf4efd10a9c903
    
      IBM S/390 architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_s390.deb
          Size/MD5 checksum:    70750 3fef60cf062e9f28ef8d3a85ef43ca91
    
      Sun Sparc architecture:
    
        https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_sparc.deb
          Size/MD5 checksum:    69736 fe571fe5a8d149fd8a33e00e95ef9408
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb https://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    Advisories

    LinuxSecurity Poll

    I agree with Linus Torvalds - Apple's new M1-powered laptops should run on Linux.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/45-i-agree-with-linus-torvalds-apple-s-new-m1-powered-laptops-should-run-on-linux?task=poll.vote&format=json
    45
    radio
    [{"id":"158","title":"True","votes":"14","type":"x","order":"1","pct":2.76,"resources":[]},{"id":"159","title":"False","votes":"493","type":"x","order":"2","pct":97.24,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.