Debian: www-sql Buffer overflow vulnerability

    Date19 Jun 2004
    CategoryDebian
    2350
    Posted ByLinuxSecurity Advisories
    Exploiting this vulnerability, a local user could cause the execution of arbitrary code by creating a web page and processing it with www-sql.
    
    Debian Security Advisory DSA 523-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Matt Zimmerman
    June 19th, 2004                          http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : www-sql
    Vulnerability  : buffer overflow
    Problem-Type   : local
    Debian-specific: no
    CVE Ids        : CAN-2004-0455
    
    Ulf Härnhammar discovered a buffer overflow vulnerability in www-sql,
    a CGI program which enables the creation of dynamic web pages by
    embedding SQL statements in HTML.  By exploiting this
    vulnerability, a local user could cause the execution of arbitrary
    code by creating a web page and processing it with www-sql.
    
    For the current stable distribution (woody), this problem has been
    fixed in version 0.5.7-17woody1.
    
    For the unstable distribution (sid), this problem will be fixed soon.
    
    We recommend that you update your www-sql package.
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7-17woody1.dsc
          Size/MD5 checksum:      623 830be25aad38186b4178ce5ff424d796
         http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7-17woody1.diff.gz
          Size/MD5 checksum:     5651 17f259d168cb7d620c125d5d7cc3a311
         http://security.debian.org/pool/updates/main/w/www-sql/www-sql_0.5.7.orig.tar.gz
          Size/MD5 checksum:   144332 96aaae705c711c4af723c6646a48c301
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_alpha.deb
          Size/MD5 checksum:    47508 453ee924cde1a11376a4502995670e8e
         http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_alpha.deb
          Size/MD5 checksum:    48472 e1652f6b7d2454a7e1288874821a09e1
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_arm.deb
          Size/MD5 checksum:    42002 4254ca5e05d673c1d73c4f9ed73ed126
         http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_arm.deb
          Size/MD5 checksum:    42338 404e674c59182c200b9693d80289b752
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_i386.deb
          Size/MD5 checksum:    41446 28de214d36809a8ed88484d65a290619
         http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_i386.deb
          Size/MD5 checksum:    41798 3cdd4a39f99a88b4ee868c7be8e051fc
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_ia64.deb
          Size/MD5 checksum:    53050 8d8caceeb1843afef110dba1f94f91bb
         http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_ia64.deb
          Size/MD5 checksum:    53524 b5e42ce7363e4617fe88a05fc1dd048e
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_hppa.deb
          Size/MD5 checksum:    45330 a0da3671f82ebd5c4dac0ff894463021
         http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_hppa.deb
          Size/MD5 checksum:    45796 6729114cc8e92fa1b278ccf619370f50
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_m68k.deb
          Size/MD5 checksum:    40222 0af8912f6629243e49f71b520c9522c1
         http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_m68k.deb
          Size/MD5 checksum:    40542 edb269316ec27e7f73bb801e0bb74c00
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_mips.deb
          Size/MD5 checksum:    45190 eba2210f7bbfb019d7a4dacb40e69460
         http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_mips.deb
          Size/MD5 checksum:    45438 ee92959d93a961dcd431a7b917677aef
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_mipsel.deb
          Size/MD5 checksum:    45154 409d7105da9c8ad1f6058d5ac9afa3e1
         http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_mipsel.deb
          Size/MD5 checksum:    45396 3c546d9fb0bd4a8e9d7cf49170548025
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_powerpc.deb
          Size/MD5 checksum:    43308 c28b6434bd49223dad7d0b66dfcadc2b
         http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_powerpc.deb
          Size/MD5 checksum:    43590 99ac9c623aeca76c3ff11c5396dc0cd6
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_s390.deb
          Size/MD5 checksum:    41964 39051246d47b4f0aee9f329127d0d399
         http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_s390.deb
          Size/MD5 checksum:    42342 00527844efabda772352978219f3f0bc
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/w/www-sql/www-mysql_0.5.7-17woody1_sparc.deb
          Size/MD5 checksum:    45352 5efc0ca0ae8903745c0a432be05d177e
         http://security.debian.org/pool/updates/main/w/www-sql/www-pgsql_0.5.7-17woody1_sparc.deb
          Size/MD5 checksum:    43040 daa363e35825f94fa0d6717da3f163ad
    
      These files will probably be moved into the stable distribution on
      its next revision.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.