Debian: 'node' buffer overflow, format string

    Date29 Aug 2003
    CategoryDebian
    1849
    Posted ByLinuxSecurity Advisories
    Morgan alias SM6TKY discovered and fixed several security relatedproblems in LinuxNode, an Amateur Packet Radio Node program. Thebuffer overflow he discovered can be used to gain unauthorised rootaccess and can be remotely triggered.
    
    --------------------------------------------------------------------------
    Debian Security Advisory DSA 274-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.
    	 
    http://www.debian.org/security/                             Martin Schulze
    August 29th, 2003                        http://www.debian.org/security/faq
    --------------------------------------------------------------------------
    
    Package        : node
    Vulnerability  : buffer overflow, format string
    Problem-Type   : remote
    Debian-specific: no
    
    Morgan alias SM6TKY discovered and fixed several security related
    problems in LinuxNode, an Amateur Packet Radio Node program.  The
    buffer overflow he discovered can be used to gain unauthorised root
    access and can be remotely triggered.
    
    For the stable distribution (woody) this problem has been
    fixed in version 0.3.0a-2woody1.
    
    For the unstable distribution (sid) this problem has been fixed in
    version 0.3.2-1.
    
    We recommend that you upgrade your node packages immediately.
    
    
    Upgrade Instructions
    --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1.dsc
          Size/MD5 checksum:      588 1efa176d975c1e05370f8ba964516797
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1.diff.gz
          Size/MD5 checksum:     6480 188fb0de8bf4e0befe24381e0dae20de
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a.orig.tar.gz
          Size/MD5 checksum:    53547 8aff48a8744aa6ee6eaf1daa7c3b92f8
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_alpha.deb
          Size/MD5 checksum:    64240 520c82abc8809f56870724351ed6de39
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_arm.deb
          Size/MD5 checksum:    47708 7f7955e0159549de75ec925f2237b7c9
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_i386.deb
          Size/MD5 checksum:    47484 dbf928e7f52f5194fea6a03d2d3fdf01
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_ia64.deb
          Size/MD5 checksum:    67634 71cc9de2aa3c9ad0145ff0aa3e0a29b3
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_hppa.deb
          Size/MD5 checksum:    52174 57c6db7ca08a02988fc0fb2b8bbe23eb
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_m68k.deb
          Size/MD5 checksum:    45790 7089cd0cb435322faed03e167a6e7dc7
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_mips.deb
          Size/MD5 checksum:    52166 c6918f854b286a0b1fe46c1a4a2e0853
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_mipsel.deb
          Size/MD5 checksum:    52240 3e214a4217e6fee4c7aa32f84770c02a
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_powerpc.deb
          Size/MD5 checksum:    49514 a599cf448a4c2bc3618aa0a404742c3f
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_s390.deb
          Size/MD5 checksum:    48998 7cc2ae72a9c975d78be45cd82f115116
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/n/node/node_0.3.0a-2woody1_sparc.deb
          Size/MD5 checksum:    49524 e086b527ec73a28d9ac2109249c71691
    
    
      These files will probably be moved into the stable distribution on
      its next revision.
    
    ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"37","type":"x","order":"1","pct":51.39,"resources":[]},{"id":"88","title":"Should be more technical","votes":"10","type":"x","order":"2","pct":13.89,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"25","type":"x","order":"3","pct":34.72,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.