Debian: New openldap2.3 packags fix denial of service

    Date12 Oct 2008
    Posted ByLinuxSecurity Advisories
    Cameron Hotchkies discovered that the OpenLDAP server slapd, a free implementation of the Lightweight Directory Access Protocol, could be crashed by sending malformed ASN1 requests.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1650-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
    October 12, 2008            
    - ------------------------------------------------------------------------
    Package        : openldap2.3
    Vulnerability  : denial of service
    Problem type   : remote
    Debian-specific: no
    CVE Id(s)      : CVE-2008-2952
    Debian Bug     : 488710
    Cameron Hotchkies discovered that the OpenLDAP server slapd, a free
    implementation of the Lightweight Directory Access Protocol, could be
    crashed by sending malformed ASN1 requests.
    For the stable distribution (etch), this problem has been fixed in
    version 2.3.30-5+etch2.
    For the unstable distribution (sid), this problem has been fixed in
    version 2.4.10-3 of the openldap package.
    We recommend that you upgrade your openldap2.3 packages.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    Source archives:
        Size/MD5 checksum:  2971126 c40bcc23fa65908b8d7a86a4a6061251
        Size/MD5 checksum:   311809 22b5eafd6a8e6375ffe3fec5533a1d5d
        Size/MD5 checksum:     1205 d266aa1b763c9f0d91f7b062bfb65c86
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:  1280050 180958ccc394210e2b04ac1c532118cd
        Size/MD5 checksum:   292722 cb1433274dce06173ea7e97051863c2b
        Size/MD5 checksum:   193424 61f779bea372ee467a4691e219547c21
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:  1244538 37c9d1aba2a53ff6562678a25b6147ef
        Size/MD5 checksum:   285314 a81dd9a9a2d661d95897ca71d5a68527
        Size/MD5 checksum:   184558 e22fd11d64bad96ad7a5c6a76f69c872
    arm architecture (ARM)
        Size/MD5 checksum:   254636 1537a42a4c76d3c40feb4e35adf10abc
        Size/MD5 checksum:   141986 fbda3408d6b35a34cd43875ee39c038a
        Size/MD5 checksum:  1188920 b556015d8462a5eff9e5c00cf65658ff
    hppa architecture (HP PA RISC)
        Size/MD5 checksum:   292550 a99048fa9bbf6e524a9854c7874481b3
        Size/MD5 checksum:  1304974 8a352883c7359d68ac65bef523c8c37d
        Size/MD5 checksum:   176956 dc8668a17000f0b6c6993dca2aed517a
    i386 architecture (Intel ia32)
        Size/MD5 checksum:   266054 84bb5bde130cbc49cce8654fbbf145ed
        Size/MD5 checksum:   154168 a73aa2fe4c60f7c74dfb7586ad7e9274
        Size/MD5 checksum:  1174324 e23a1aa2d33eccb2af662fbe4e5b9f6d
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:  1660820 2cd17aac1591b7f6dbc8ad9806ad7821
        Size/MD5 checksum:   379572 112ff502ca043d71907f05ad316aaa0b
        Size/MD5 checksum:   239140 db04191db37a5bf2dec66f115803ed70
    mips architecture (MIPS (Big Endian))
        Size/MD5 checksum:  1205670 2eae08b5aa3717fa050f24831870a835
        Size/MD5 checksum:   185522 9cb2d778a25d6c904bd84abbbc89fddd
        Size/MD5 checksum:   258028 4cd6d9a297dc6447e4f8ffb91d1ddddc
    mipsel architecture (MIPS (Little Endian))
        Size/MD5 checksum:  1188250 7fa6e8454be9cc2b5619fd05c088e666
        Size/MD5 checksum:   258632 369f2d0a5adc823edf8c8dcc7de8a34a
        Size/MD5 checksum:   186796 9c611e11a90f62302cab63f0561d0d1d
    powerpc architecture (PowerPC)
        Size/MD5 checksum:  1243660 2a68e3d27c0238061fdf2aa841befa23
        Size/MD5 checksum:   188790 d274c287d39d1a75bb4b6474ac1c6f34
        Size/MD5 checksum:   272242 896e4fe8de21568e3251f8060c58b145
    s390 architecture (IBM S/390)
        Size/MD5 checksum:   168388 66e6090f492708f524b83e990857cf83
        Size/MD5 checksum:  1240878 8b841b579a2ed5f7c990e5ffbcf76847
        Size/MD5 checksum:   291518 c49e29b487788b2d5a2025cedacf5ee6
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:   155004 ec1fc16d622ec4b1ecf2e2ca8b12d398
        Size/MD5 checksum:   256832 0fd6fcf2e1a0a54917c21009df1172f7
        Size/MD5 checksum:  1167556 0e95399858cd08f38c143e57c25c3db0
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.