Linux Security
Linux Security
Linux Security

Debian: New streamripper packages fix potential code execution

Date 08 Dec 2008
3554
Posted By LinuxSecurity Advisories
Multiple buffer overflows involving HTTP header and playlist parsing have been discovered in streamripper (CVE-2007-4337, CVE-2008-4829).
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1683-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
https://www.debian.org/security/                           Florian Weimer
December 08, 2008                     https://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : streamripper
Vulnerability  : buffer overflow
Problem type   : local (remote)
Debian-specific: no
CVE Id(s)      : CVE-2007-4337 CVE-2008-4829
Debian Bug     : 506377

Multiple buffer overflows involving HTTP header and playlist parsing
have been discovered in streamripper (CVE-2007-4337, CVE-2008-4829).

For the stable distribution (etch), these problems have been fixed in
version 1.61.27-1+etch1.

For the unstable distribution (sid) and the testing distribution
(lenny), these problems have been fixed in version 1.63.5-2.

We recommend that you upgrade your streamripper package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27.orig.tar.gz
    Size/MD5 checksum:   294218 8761dda030f92cbdfa38e73a981cc6bc
  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1.diff.gz
    Size/MD5 checksum:     5040 0a4fe994a155d07163b3455df5c2668b
  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1.dsc
    Size/MD5 checksum:      964 67ddf22de3c0642e41245e07e534c992

alpha architecture (DEC Alpha)

  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1_alpha.deb
    Size/MD5 checksum:    84142 9450efa0b7fcfce8e976a0a1acb9e837

amd64 architecture (AMD x86_64 (AMD64))

  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1_amd64.deb
    Size/MD5 checksum:    75808 0d0d435b05e1c7b5bf2aa375b6569ae4

arm architecture (ARM)

  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1_arm.deb
    Size/MD5 checksum:    70992 3d77dcfe3d7785aaed4544cdfd3a8489

hppa architecture (HP PA RISC)

  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1_hppa.deb
    Size/MD5 checksum:    77884 aff00b60cc13c3c46232f86a1bfab553

i386 architecture (Intel ia32)

  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1_i386.deb
    Size/MD5 checksum:    71180 61c43e7298aac28f4e96287e7eb8b1b0

ia64 architecture (Intel ia64)

  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1_ia64.deb
    Size/MD5 checksum:    99678 b18634cd32a198e747aa99470d3863ab

mips architecture (MIPS (Big Endian))

  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1_mips.deb
    Size/MD5 checksum:    78584 a417879681280d7f4640557cf1b6085a

mipsel architecture (MIPS (Little Endian))

  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1_mipsel.deb
    Size/MD5 checksum:    78814 c92e229fc90db4cf408ee44a619545ee

powerpc architecture (PowerPC)

  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1_powerpc.deb
    Size/MD5 checksum:    76114 45d0eaaea3a1ec5d874aa9f51221d89c

s390 architecture (IBM S/390)

  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1_s390.deb
    Size/MD5 checksum:    75984 7aaff15041ece4095eaa1ab470aed7b6

sparc architecture (Sun SPARC/UltraSPARC)

  https://security.debian.org/pool/updates/main/s/streamripper/streamripper_1.61.27-1+etch1_sparc.deb
    Size/MD5 checksum:    70322 78e266c09b92286776216406420f1220


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb https://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"64","type":"x","order":"1","pct":76.19,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"13","type":"x","order":"2","pct":15.48,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.