[42471] in bugtraq
[SECURITY] [DSA 952-1] New libapache-auth-ldap packages fix arbitrary code execution
daemon@ATHENA.MIT.EDU (Martin Schulze)
Fri Jan 27 00:41:31 2006
X-Original-To: debian-security-announce@lists.debian.org
Message-Id: <m1F12LP-000pRWC@finlandia.Infodrom.North.DE>
Date: Mon, 23 Jan 2006 15:06:55 +0100 (CET)
From: joey@infodrom.org (Martin Schulze)
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Reply-To: listadmin@securityfocus.com
Mail-Followup-To: bugtraq@securityfocus.com
To: bugtraq@securityfocus.com
Resent-From: list@murphy.debian.org (Mailing List Manager)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 952-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
January 23rd, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : libapache-auth-ldap
Vulnerability : format string
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2006-0150
"Seregorn" discovered a format string vulnerability in the logging
function of libapache-auth-ldap, an LDAP authentication module for the
Apache webserver, that can lead to the execution of arbitrary code.
For the old stable distribution (woody) this problem has been fixed in
version 1.6.0-3.1.
For the stable distribution (sarge) this problem has been fixed in
version 1.6.0-8.1
The unstable distribution (sid) does no longer contain libapache-auth-ldap.
We recommend that you upgrade your libapache-auth-ldap package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1.dsc
Size/MD5 checksum: 652 6ef1d9323674ef6a5f076b3b65ccf60e
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1.diff.gz
Size/MD5 checksum: 3927 e8197f2db55a7c9e570ee5f72bc3ff39
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0.orig.tar.gz
Size/MD5 checksum: 79058 de283639b40e3f359ad6e4a65cad1813
Alpha architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_alpha.deb
Size/MD5 checksum: 71528 46f26f6c68fa1e900e7c3b4b6f65e83c
ARM architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_arm.deb
Size/MD5 checksum: 69554 59ed4e025245a4b2397530f165d7a20e
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_i386.deb
Size/MD5 checksum: 68958 1bded30a2554d58d8a856e61477b42ba
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_ia64.deb
Size/MD5 checksum: 75804 a7af3cc2e12376a386659e118064efb3
HP Precision architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_hppa.deb
Size/MD5 checksum: 71264 4ee43bc263b35ec2dd199bfde43d890d
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_m68k.deb
Size/MD5 checksum: 69354 ade63074b9f3ff1c6f46ff19262ecf2d
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_mips.deb
Size/MD5 checksum: 68724 2ffc67d01923a581918344100a8461ae
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_mipsel.deb
Size/MD5 checksum: 68656 e69c65426f6d102e2da0fa204e8a3b59
PowerPC architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_powerpc.deb
Size/MD5 checksum: 70020 920814cda6c57190e68160c087b76bea
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_s390.deb
Size/MD5 checksum: 69386 c74da92420df9b49c48f3bd6487d8579
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-3.1_sparc.deb
Size/MD5 checksum: 72126 6c28b218349faffe5a8789315b41d212
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1.dsc
Size/MD5 checksum: 672 823af0881e3fc9ecaaf4ec4de445a2a1
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1.diff.gz
Size/MD5 checksum: 5015 f3d65a99091bb695e9cdeb6f27c28a1b
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0.orig.tar.gz
Size/MD5 checksum: 79058 de283639b40e3f359ad6e4a65cad1813
Alpha architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_alpha.deb
Size/MD5 checksum: 71318 fd007ba23080c94b621351ea8d4c3e2d
AMD64 architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_amd64.deb
Size/MD5 checksum: 70800 f056405e0dd083eba4e1a97ee972be10
ARM architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_arm.deb
Size/MD5 checksum: 69298 a6475d8a98ca1687d30367b24fdcdee6
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_i386.deb
Size/MD5 checksum: 69192 ddce8c4e7958dac6dd637f210f3690ea
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_ia64.deb
Size/MD5 checksum: 74662 07480ce393dfe2c820cdfed1e09c3fad
HP Precision architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_hppa.deb
Size/MD5 checksum: 71836 ffb117f0c3b8ca64181509172717441e
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_m68k.deb
Size/MD5 checksum: 69592 2d2436f78415a7032b7724ffc94711f2
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_mips.deb
Size/MD5 checksum: 69240 93eeb7ec212188e9fc66a38100ae0fb2
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_mipsel.deb
Size/MD5 checksum: 69142 e5d3c43b616478ffea76c6708726436e
PowerPC architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_powerpc.deb
Size/MD5 checksum: 71252 81e2369976e82a79babf4efd10a9c903
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_s390.deb
Size/MD5 checksum: 70750 3fef60cf062e9f28ef8d3a85ef43ca91
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/liba/libapache-auth-ldap/libapache-auth-ldap_1.6.0-8.1_sparc.deb
Size/MD5 checksum: 69736 fe571fe5a8d149fd8a33e00e95ef9408
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFD1OL/W5ql+IAeqTIRAn2RAJ4zxBIQfpwOZFWUWHrg9tGMO807bgCgh/nf
EK/y5+87EJnDErRkH61b4PQ=
=4o8T
-----END PGP SIGNATURE-----