Debian: New links2 packages fix arbitrary shell command execution

    Date21 Dec 2006
    CategoryDebian
    3761
    Posted ByLinuxSecurity Advisories
    Teemu Salmela discovered that the links2 character mode web browser performs insufficient sanitising of smb:// URIs, which might lead to the execution of arbitrary shell commands.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1240-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                               Steve Kemp
    December 21, 2006
    - ------------------------------------------------------------------------
    
    Package        : links2
    Vulnerability  : insufficient escaping
    Problem type   : remote
    Debian-specific: no
    CVE Id(s)      : CVE-2006-5925
    Debian Bug     : 400718
    
    Teemu Salmela discovered that the links2 character mode web browser
    performs insufficient sanitising of smb:// URIs, which might lead to the
    execution of arbitrary shell commands.
    
    For the stable distribution (sarge) this problem has been fixed in
    version 2.1pre16-1sarge1.
    
    For the upcoming stable distribution (etch) this problem has been
    fixed in version 2.1pre26-1.
    
    For the unstable distribution (sid) this problem has been fixed in
    version 2.1pre26-1.
    
    We recommend that you upgrade your links2 package.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    Debian 3.1 (stable)
    - -------------------
    
    Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1.diff.gz
        Size/MD5 checksum:    28658 a83c79990bbfb6f9ec26d737f767ee90
      http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16.orig.tar.gz
        Size/MD5 checksum:  4217483 7baf4fc20cc244d80ead21cebff07d89
      http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1.dsc
        Size/MD5 checksum:      841 ed4853334b7eebef055271df06cdcd7a
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_alpha.deb
        Size/MD5 checksum:  2110324 b3633fddb199c45339d3837bb0a519a0
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_amd64.deb
        Size/MD5 checksum:  2040922 5fb402e6a833709741d20238346c7597
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_arm.deb
        Size/MD5 checksum:  1996004 c7c79ddcb82d5758668ed71d74b9685f
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_i386.deb
        Size/MD5 checksum:  1997426 4c1ef611e31c57583f7471653962a84a
    
    m68k architecture (Motorola Mc680x0)
    
      http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_m68k.deb
        Size/MD5 checksum:  1904084 e5c777a07eaa88f4367b51d88c556a14
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_mips.deb
        Size/MD5 checksum:  2034596 22854de6eaf3aa1e392291760e85e5e8
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"8","type":"x","order":"1","pct":61.54,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":23.08,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":15.38,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.