Linux Security
Linux Security
Linux Security

Debian: New libapache-auth-ldap packages fix arbitrary code execution

Date 27 Jan 2006
4063
Posted By Joe Shakespeare
"Seregorn" discovered a format string vulnerability in the logging function of libapache-auth-ldap, an LDAP authentication module for the Apache webserver, that can lead to the execution of arbitrary code.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 952-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.
https://www.debian.org/security/                         Moritz Muehlenhoff
January 23rd, 2006                      https://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : libapache-auth-ldap
Vulnerability  : format string
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2006-0150

"Seregorn" discovered a format string vulnerability in the logging
function of libapache-auth-ldap, an LDAP authentication module for the
Apache webserver, that can lead to the execution of arbitrary code.

For the old stable distribution (woody) this problem has been fixed in
version 1.6.0-3.1.

For the stable distribution (sarge) this problem has been fixed in
version 1.6.0-8.1

The unstable distribution (sid) does no longer contain libapache-auth-ldap.

We recommend that you upgrade your libapache-auth-ldap package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1.dsc
      Size/MD5 checksum:      652 6ef1d9323674ef6a5f076b3b65ccf60e
    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1.diff.gz
      Size/MD5 checksum:     3927 e8197f2db55a7c9e570ee5f72bc3ff39
    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0.orig.tar.gz
      Size/MD5 checksum:    79058 de283639b40e3f359ad6e4a65cad1813

  Alpha architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_alpha.deb
      Size/MD5 checksum:    71528 46f26f6c68fa1e900e7c3b4b6f65e83c

  ARM architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_arm.deb
      Size/MD5 checksum:    69554 59ed4e025245a4b2397530f165d7a20e

  Intel IA-32 architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_i386.deb
      Size/MD5 checksum:    68958 1bded30a2554d58d8a856e61477b42ba

  Intel IA-64 architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_ia64.deb
      Size/MD5 checksum:    75804 a7af3cc2e12376a386659e118064efb3

  HP Precision architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_hppa.deb
      Size/MD5 checksum:    71264 4ee43bc263b35ec2dd199bfde43d890d

  Motorola 680x0 architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_m68k.deb
      Size/MD5 checksum:    69354 ade63074b9f3ff1c6f46ff19262ecf2d

  Big endian MIPS architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_mips.deb
      Size/MD5 checksum:    68724 2ffc67d01923a581918344100a8461ae

  Little endian MIPS architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_mipsel.deb
      Size/MD5 checksum:    68656 e69c65426f6d102e2da0fa204e8a3b59

  PowerPC architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_powerpc.deb
      Size/MD5 checksum:    70020 920814cda6c57190e68160c087b76bea

  IBM S/390 architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_s390.deb
      Size/MD5 checksum:    69386 c74da92420df9b49c48f3bd6487d8579

  Sun Sparc architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_sparc.deb
      Size/MD5 checksum:    72126 6c28b218349faffe5a8789315b41d212


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1.dsc
      Size/MD5 checksum:      672 823af0881e3fc9ecaaf4ec4de445a2a1
    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1.diff.gz
      Size/MD5 checksum:     5015 f3d65a99091bb695e9cdeb6f27c28a1b
    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0.orig.tar.gz
      Size/MD5 checksum:    79058 de283639b40e3f359ad6e4a65cad1813

  Alpha architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_alpha.deb
      Size/MD5 checksum:    71318 fd007ba23080c94b621351ea8d4c3e2d

  AMD64 architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_amd64.deb
      Size/MD5 checksum:    70800 f056405e0dd083eba4e1a97ee972be10

  ARM architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_arm.deb
      Size/MD5 checksum:    69298 a6475d8a98ca1687d30367b24fdcdee6

  Intel IA-32 architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_i386.deb
      Size/MD5 checksum:    69192 ddce8c4e7958dac6dd637f210f3690ea

  Intel IA-64 architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_ia64.deb
      Size/MD5 checksum:    74662 07480ce393dfe2c820cdfed1e09c3fad

  HP Precision architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_hppa.deb
      Size/MD5 checksum:    71836 ffb117f0c3b8ca64181509172717441e

  Motorola 680x0 architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_m68k.deb
      Size/MD5 checksum:    69592 2d2436f78415a7032b7724ffc94711f2

  Big endian MIPS architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_mips.deb
      Size/MD5 checksum:    69240 93eeb7ec212188e9fc66a38100ae0fb2

  Little endian MIPS architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_mipsel.deb
      Size/MD5 checksum:    69142 e5d3c43b616478ffea76c6708726436e

  PowerPC architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_powerpc.deb
      Size/MD5 checksum:    71252 81e2369976e82a79babf4efd10a9c903

  IBM S/390 architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_s390.deb
      Size/MD5 checksum:    70750 3fef60cf062e9f28ef8d3a85ef43ca91

  Sun Sparc architecture:

    https://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_sparc.deb
      Size/MD5 checksum:    69736 fe571fe5a8d149fd8a33e00e95ef9408


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb https://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"64","type":"x","order":"1","pct":76.19,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"13","type":"x","order":"2","pct":15.48,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.