Debian: UPDATED: openssh-krb5 buffer handling vulnerability

    Date17 Sep 2003
    CategoryDebian
    2243
    Posted ByLinuxSecurity Advisories
    Several bugs have been found in OpenSSH's buffer handling. It is notknown if these bugs are exploitable, but as a precaution an upgrade isadvised.
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-383-1                   This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                         Wichert Akkerman
    September 17, 2003
    - ------------------------------------------------------------------------
    
    
    Package        : ssh-krb5
    Vulnerability  : buffer handling
    Problem type   : possible remote
    Debian-specific: no
    CVS references : CAN-2003-0693 CAN-2003-0695
    
    Several bugs have been found in OpenSSH's buffer handling. It is not
    known if these bugs are exploitable, but as a precaution an upgrade is
    advised.
    
    For the Debian stable distribution these bugs have been fixed in version
    1:3.4p1-0woody3 .
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/o/openssh-krb5/openssh-krb5_3.4p1.orig.tar.gz
          Size/MD5 checksum:   837668 459c1d0262e939d6432f193c7a4ba8a8
         http://security.debian.org/pool/updates/main/o/openssh-krb5/openssh-krb5_3.4p1-0woody3.diff.gz
          Size/MD5 checksum:   120256 101711fd74f01e6e670c334752cafe44
         http://security.debian.org/pool/updates/main/o/openssh-krb5/openssh-krb5_3.4p1-0woody3.dsc
          Size/MD5 checksum:      822 e39ebe0e44ae1998d5c47ddb45d6dbe8
    
      alpha architecture (DEC Alpha)
    
         http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_alpha.deb
          Size/MD5 checksum:   888466 dd124b4ce632d30f00eed9409ea5b42a
    
      arm architecture (ARM)
    
         http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_arm.deb
          Size/MD5 checksum:   687666 9cc220113aadc19c647fb65f5f0d998b
    
      hppa architecture (HP PA RISC)
    
         http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_hppa.deb
          Size/MD5 checksum:   789256 a5bbdfbea796a3e2d6b979622466ab63
    
      i386 architecture (Intel ia32)
    
         http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_i386.deb
          Size/MD5 checksum:   671568 faa1fa7949a7cce9388057a485d98dc5
    
      ia64 architecture (Intel ia64)
    
         http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_ia64.deb
          Size/MD5 checksum:  1049956 51e568695ef150e6049e7b5b42d23891
    
      mipsel architecture (MIPS (Little Endian))
    
         http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_mipsel.deb
          Size/MD5 checksum:   759494 0aeeb07fe815b8a0e36e5ded2763d1ab
    
      powerpc architecture (PowerPC)
    
         http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_powerpc.deb
          Size/MD5 checksum:   711472 cf3efec05458df632179302cd78032f0
    
      s390 architecture (IBM S/390)
    
         http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_s390.deb
          Size/MD5 checksum:   749046 93cc4a83d9b3afded11ccc1a6a62d127
    
      sparc architecture (Sun SPARC/UltraSPARC)
    
         http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_sparc.deb
          Size/MD5 checksum:   694616 b56ebfa782eb8645e34058facd3e9ca5
    - -- 
    - ----------------------------------------------------------------------------
    Debian Security team <This email address is being protected from spambots. You need JavaScript enabled to view it.> 
    http://www.debian.org/security/
    Mailing-List: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"13","type":"x","order":"1","pct":54.17,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":16.67,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"7","type":"x","order":"3","pct":29.17,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.