Linux Security
Linux Security
Linux Security

New version of htdig released

Date 13 Dec 1999
3060
Posted By LinuxSecurity Advisories
The version of htdig that was shipped in Debian GNU/Linux 2.1 has a problem with calling external programs to handle non-HTML documents: it calls the external program with the document as a parameter, but does not check for shell escapes. This can be exploited by creating files with filenames that include shell escapes to run arbitraty commands on the machine that runs htdig.
-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory                             This email address is being protected from spambots. You need JavaScript enabled to view it.
https://www.debian.org/security/      
                   Wichert Akkerman
December  9, 1999
- ------------------------------------------------------------------------


Package           : htdig
Vulnerability type: remote exploit
Debian-specific   : no

The version of htdig that was shipped in Debian GNU/Linux 2.1 has a problem
with calling external programs to handle non-HTML documents: it calls
the external program with the document as a parameter, but does not check
for shell escapes. This can be exploited by creating files with filenames
that include shell escapes to run arbitraty commands on the machine that
runs htdig.

This has been fixed in version 3.1.2-4slink6. We recommend you upgrade your
htdig package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.1 alias slink
- --------------------------------

  This version of Debian was released only for Intel ia32, the Motorola
  680x0, the alpha and the Sun sparc architecture.

  Source archives:
    https://security.debian.org/dists/stable/updates/source/htdig_3.
1.2-4slink6.diff.gz
      MD5 checksum: 9151d7e15d7a2759958c09e6c21f28de
    https://security.debian.org/dists/stable/updates/source/htdig_3.1.2-
4slink6.dsc
      MD5 checksum: fc05d22813afaa9fce10e97a5437ed69
    https://security.debian.org/dists/stable/updates/source/htdig_3.1.2.orig.ta
r.gz
      MD5 checksum: ddd0305d420e2d6025694d4e1448d5f7

  Alpha architecture:
    https://security.debian.org/dists/stable/updates/binary-
alpha/htdig_3.1.2-4slink6_alpha.deb
      MD5 checksum: 1f816b0af2dd5919524d26be2017ec62

  Intel ia32 architecture:
    https://security.debian.org/dists/stable/updates/binary-
i386/htdig_3.1.2-4slink6_i386.deb
      MD5 checksum: da77c99388d3d9d09afecb2c9f345d58

  Motorola 680x0 architecture:
    https://security.debian.org/dists/stable/updates/binary-
m68k/htdig_3.1.2-4slink6_m68k.deb
      MD5 checksum: 48986e8f5323db7b899c6341b87c3d4d

  Sun Sparc architecture:
    https://security.debian.org/dists/stable/updates/binary-
sparc/htdig_3.1.2-4slink6_sparc.deb
      MD5 checksum: fcd3181ad76a72e82db2f769d88ff18c


  These files will be moved into
  ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.


For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- -- 
- ----------------------------------------------------------------------------
For apt-get: deb https://security.debian.org/ stable 
updates
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBOFAcLKjZR/ntlUftAQHsWgL5Ac+Abk+Pb2KyIku7xLeZxjW070Fiobgf
T548F8YI+BpmvIfUfpH/d8FcSm5ICKjwvUiRtkuj8gamrBWDjOwjVy9stxJeUUnE
muYlVP4LD9FrsmBJgID0I2v1fVwxgcxP
=nfJK
-----END PGP SIGNATURE-----


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"47","type":"x","order":"1","pct":79.66,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.86,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.47,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.