Linux Security
    Linux Security
    Linux Security

    Debian: 'uucp' Remote DoS

    Date 01 Jun 2002
    Posted By LinuxSecurity Advisories
    An authentication agent in the uucp package does not properly terminate certain long input strings.
    Debian Security Advisory                                 This email address is being protected from spambots. You need JavaScript enabled to view it.                                Michael Stone
    May 27, 2002
    Package: uucp
    Vulnerability: remote dos
    Debian-specific: yes
    We have received reports that in.uucpd, an authentication agent in the
    uucp package, does not properly terminate certain long input strings.
    This has been corrected in uucp package version 1.06.1-11potato3 for
    Debian 2.2 (potato) and in version 1.06.1-18 for the upcoming (woody)
    We recommend you upgrade your uucp package immediately.
    wget url
    	will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 2.2 alias potato
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
      Source archives:
          MD5 checksum: 72a754638558507ee3f1794a22133db3
          MD5 checksum: 549d78afae9c33422dbb325f5e2f60b9
          MD5 checksum: 390af5277915fcadbeee74d2f3038af9
      Alpha architecture:
          MD5 checksum: 15fac849328d57860aedf2cba8274170
      ARM architecture:
          MD5 checksum: 410fe766a74528e6b7564821e4b3aa7e
      Intel IA-32 architecture:
          MD5 checksum: 26f22db0eeed4cabad46861112d94d47
      Motorola 680x0 architecture:
          MD5 checksum: 80ce564f52e43917c7e76411adfe6206
      PowerPC architecture:
          MD5 checksum: 744c3a2c394a02ada9ef6c43b539fab9
      Sun Sparc architecture:
          MD5 checksum: d3ac8428c4d2f65573b0946a31234422
      These packages will be moved into the stable distribution on its next
    For not yet released architectures please refer to the appropriate
    directory$arch/ .
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.