Lucene search

K
debianDebianDEBIAN:1CF07A2CA65D05E3D969BA3D8BC5FDBC:D92FC
HistoryDec 10, 2008 - 3:48 p.m.

[Backports-security-announce] Security Update for linuxdcpp

2008-12-1015:48:47
lists.debian.org
12

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.04 Low

EPSS

Percentile

92.1%

Gerfried Fuchs uploaded new packages for linuxdcpp which fixed the
following security problems:

CVE-2008-2953, Debian Bug #488630

Linux DC++ (linuxdcpp) before 0.707 allows remote attackers to cause a
denial of service (crash) via "partial file list requests" that
trigger a NULL pointer dereference.

CVE-2008-2954, Debian Bug #488630

cient/NmdcHub.cpp in Linux DC++ (linuxdcpp) before 0.707 allows remote
attackers to cause a denial of service (crash) via an empty private
message, which triggers an out-of-bounds read.

For the etch-backports distribution the problems have been fixed in
version 1.0.2-1~bpo40+1.

For the lenny and sid distributions the problems have been fixed in
version 1.0.1-2.

Upgrade instructions

If you don't use pinning (see [1]) you have to update the packages
manually via "apt-get -t etch-backports install <packagelist>" with the
packagelist of your installed packages affected by this update.
[1] <http://backports.org/dokuwiki/doku.php?id=instructions&gt;

We recommend to pin the backports repository to 200 so that new versions
of installed backports will be installed automatically:

Package: *
Pin: release a=etch-backports
Pin-Priority: 200
Attachment:
signature.asc
Description: Digital signature

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.04 Low

EPSS

Percentile

92.1%