New versions of epic4 fixes possible DoS vulnerability

    Date13 Dec 1999
    CategoryDebian
    2586
    Posted ByLinuxSecurity Advisories
    We have received a report from the author of epic4 covering a denial of service vulnerability. All versions of epic4 between version pre1.034 (including) and version pre2.004-19990718 (excluding) are vulnerable. They contain code which makes epic4 walk off of a string, causing the client to crash and possibly display arbitrary characters on the terminal.
    ---------------------------------------------------------------------------
    Debian Security Advisory                                This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/      
                            Martin Schulze
    August 26, 1999
    ---------------------------------------------------------------------------
    
    
    We have received a report from the author of epic4 covering a denial
    of service vulnerability.  All versions of epic4 between version
    pre1.034 (including) and version pre2.004-19990718 (excluding) are
    vulnerable.  They contain code which makes epic4 walk off of a string,
    causing the client to crash and possibly display arbitrary characters
    on the terminal.
    
    
    We recommend you upgrade your epic4 packages immediately.
    
    
    wget url
    	will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    
    Debian GNU/Linux 2.1 alias slink
    --------------------------------
    
      This version of Debian was released only for the Intel, the
      Motorola 68xxx, the alpha and the Sun sparc architecture.
    
      Source archives:
    
        ftp://ftp.debian.org/debian/dists/proposed-updates/epic4_pre2.003-0slink2.diff.gz
          MD5 checksum: 587def2142692d6c813c9aef8b250d0e
        ftp://ftp.debian.org/debian/dists/proposed-updates/epic4_pre2.003-0slink2.dsc
          MD5 checksum: e90e72db5f162d95bfe0318965fe743a
        ftp://ftp.debian.org/debian/dists/proposed-updates/epic4_pre2.003.orig.tar.gz
          MD5 checksum: 76ceeb97abf12e80df395c0ffb917eb3
    
      Alpha architecture:
    
        ftp://ftp.debian.org/debian/dists/proposed-updates/epic4_pre2.003-0slink2_alpha.deb
          MD5 checksum: 836e1f26eda5e01e9eee981cb42f8d92
        ftp://ftp.debian.org/debian/dists/proposed-updates/epic4-dbg_pre2.003-0slink2_alpha.deb
          MD5 checksum: 83e9056fdddb471b3cc4530e46518a29
    
      Intel ia32 architecture:
    
        ftp://ftp.debian.org/debian/dists/proposed-updates/epic4_pre2.003-0slink2_i386.deb
          MD5 checksum: de8dee999d738609a14ea698bff83b3a
        ftp://ftp.debian.org/debian/dists/proposed-updates/epic4-dbg_pre2.003-0slink2_i386.deb
          MD5 checksum: 2abf5a40aab6fe335da43577dd8fc2df
    
      Motorola 680x0 architecture:
    
        ftp://ftp.debian.org/debian/dists/proposed-updates/epic4_pre2.003-0slink2_m68k.deb
          MD5 checksum: b56b7ed67f788cfc8863609392129262
        ftp://ftp.debian.org/debian/dists/proposed-updates/epic4-dbg_pre2.003-0slink2_m68k.deb
          MD5 checksum: c0882ececb2db804559522beaab025a8
    
      Sun Sparc architecture:
    
        ftp://ftp.debian.org/debian/dists/proposed-updates/epic4_pre2.003-0slink2_sparc.deb
          MD5 checksum: e2ec2da59f4e120bc2b46c6c897998ba
        ftp://ftp.debian.org/debian/dists/proposed-updates/epic4-dbg_pre2.003-0slink2_sparc.deb
          MD5 checksum: 8db84c4840db3f81c97bf15b963315fb
    
    
    Debian GNU/Linux pre2.2 alias potato
    ------------------------------------
    
      Source archives:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/source/net/epic4_pre2.004-19990718-1.diff.gz
          MD5 checksum: f7a7c58fe67d12239acb74cc103f30ac
        ftp://ftp.debian.org/debian/dists/unstable/main/source/net/epic4_pre2.004-19990718-1.dsc
          MD5 checksum: 370d5f31de63e69ba7c13d3eb0b93b6d
        ftp://ftp.debian.org/debian/dists/unstable/main/source/net/epic4_pre2.004-19990718.orig.tar.gz
          MD5 checksum: 228babc39a9dcc6327b1c7b6f2e689d7
    
      Alpha architecture:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-alpha/net/epic4_pre2.004-19990718-1.deb
          MD5 checksum: 57f888cb6a049335900f30e3138ffbcb
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-alpha/net/epic4-dbg_pre2.004-19990718-1.deb
          MD5 checksum: 7e60edcb836350730c981a6da30f5393
    
      ARM architecture:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-arm/net/epic4_pre2.004-19990718-1.deb
          MD5 checksum: d96c8e05abdfd5386e42117b5f7eed02
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-arm/net/epic4-dbg_pre2.004-19990718-1.deb
          MD5 checksum: 9a4cdf86ab7ac131bb95db494dcde770
    
      Intel ia32 architecture:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-i386/net/epic4_pre2.004-19990718-1.deb
          MD5 checksum: 61ed5f0568fa3c7457da7a1a7611b311
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-i386/net/epic4-dbg_pre2.004-19990718-1.deb
          MD5 checksum: 9a0361cce15def9c8bf87f0b6320d29e
    
      Motorola 680x0 architecture:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-m68k/net/epic4_pre2.004-19990718-1.deb
          MD5 checksum: ea40ed1442bfc0e6ddf39119af6b8de2
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-m68k/net/epic4-dbg_pre2.004-19990718-1.deb
          MD5 checksum: 81da2abae81c256f50094f1c926f9251
    
      PowerPC architecture:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-powerpc/net/epic4_pre2.004-19990718-1.deb
          MD5 checksum: 55f133dcee4fcc345266bc510af47a14
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-powerpc/net/epic4-dbg_pre2.004-19990718-1.deb
          MD5 checksum: 9c3d2cb97da84d61e6a3aebf34834d3f
    
      Sun Sparc architecture:
    
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-sparc/net/epic4_pre2.004-19990718-1.deb
          MD5 checksum: 211bbc7352257e088f1ba13bedc8c5e0
        ftp://ftp.debian.org/debian/dists/unstable/main/binary-sparc/net/epic4-dbg_pre2.004-19990718-1.deb
          MD5 checksum: 584d2e0470dae72c9f5afc0d2c976906
    
    
    For not yet released architectures please refer to the appropriate
    directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    -- 
    For apt-get: deb http://security.debian.org/ stable updates
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    PGP signature


    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.