Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2001.434 -- Debian Security Advisory DSA 081-1 New w3m packages fix buffer overflow 19 October 2001 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: w3m w3m-ssl Vendor: Debian Operating System: Debian GNU/Linux 2.2 Linux Unix Platform: Alpha ARM i386 PowerPC Sparc Impact: Execute Arbitrary Code/Commands Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 081-1 security@debian.org http://www.debian.org/security/ Martin Schulze October 18th, 2001 - - -------------------------------------------------------------------------- Packages : w3m, w3m-ssl Vulnerability : Buffer Overflow Problem-Type : remote code execution Debian-specific: no In SNS Advisory No. 32 a buffer overflow vulnerability has been reported in the routine which parses MIME headers that are returned from web servers. A malicious web server administrator could exploit this and let the client web browser execute arbitrary code. W3m handles MIME headers included in the request/response message of HTTP communication like any other we bbrowser. A buffer overflow will be occur when w3m receives a MIME encoded header with base64 format. This problem has been fixed by the maintainer in version 0.1.10+0.1.11pre+kokb23-4 of w3m and w3m-ssl (for the SSL-enabled version), both for Debian GNU/Linux 2.2. We recommend that you upgrade your w3m packages immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 2.2 alias potato - - ------------------------------------ Source archives: http://security.debian.org/dists/stable/updates/main/source/w3m_0.1.10+0.1.11pre+kokb23-4.diff.gz MD5 checksum: 94e868f1fa21be50a56d40007a21acc6 http://security.debian.org/dists/stable/updates/main/source/w3m_0.1.10+0.1.11pre+kokb23.orig.tar.gz MD5 checksum: 8f4503bbc966761d806d770fe1632450 http://security.debian.org/dists/stable/updates/main/source/w3m_0.1.10+0.1.11pre+kokb23-4.dsc MD5 checksum: 46bd8e55a198036391b57a847486c303 http://security.debian.org/dists/stable/updates/main/source/w3m-ssl_0.1.10+0.1.11pre+kokb23-4.dsc MD5 checksum: 6bc881ce595e5f723bcbd61dc6520523 http://security.debian.org/dists/stable/updates/main/source/w3m-ssl_0.1.10+0.1.11pre+kokb23-4.tar.gz MD5 checksum: c857fd94c8e76f451ddfc3e59ce2d678 Alpha architecture: http://security.debian.org/dists/stable/updates/main/binary-alpha/w3m_0.1.10+0.1.11pre+kokb23-4_alpha.deb MD5 checksum: 2da17834f750361ef11f956aea86bcdc http://security.debian.org/dists/stable/updates/main/binary-alpha/w3m-ssl_0.1.10+0.1.11pre+kokb23-4_alpha.deb MD5 checksum: b5b17b0ab958e1ce5ae82998c8c52a21 ARM architecture: http://security.debian.org/dists/stable/updates/main/binary-arm/w3m_0.1.10+0.1.11pre+kokb23-4_arm.deb MD5 checksum: da67534b0182355a57618231addd92ae http://security.debian.org/dists/stable/updates/main/binary-arm/w3m-ssl_0.1.10+0.1.11pre+kokb23-4_arm.deb MD5 checksum: cd5a22df1fbca97ec3ce9d7a6760ab41 Intel ia32 architecture: http://security.debian.org/dists/stable/updates/main/binary-i386/w3m_0.1.10+0.1.11pre+kokb23-4_i386.deb MD5 checksum: 7b811019f0f246338cbf438952358b54 http://security.debian.org/dists/stable/updates/main/binary-i386/w3m-ssl_0.1.10+0.1.11pre+kokb23-4_i386.deb MD5 checksum: 07c9aa2738a22e4984c290657c71b79d PowerPC architecture: http://security.debian.org/dists/stable/updates/main/binary-powerpc/w3m_0.1.10+0.1.11pre+kokb23-4_powerpc.deb MD5 checksum: 64211980c4101e493aa2c0f906c6be9c Sun Sparc architecture: http://security.debian.org/dists/stable/updates/main/binary-sparc/w3m_0.1.10+0.1.11pre+kokb23-4_sparc.deb MD5 checksum: 4016ba11b084cd94e6023b47e7270f74 http://security.debian.org/dists/stable/updates/main/binary-sparc/w3m-ssl_0.1.10+0.1.11pre+kokb23-4_sparc.deb MD5 checksum: 4a50edab63b9fe3c6c40638902018ebb w3m-ssl is not available for stable/powerpc and neither w3m nor w3m-ssl are available for m68k. These files will be moved into the stable distribution on its next revision. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE7ztdUW5ql+IAeqTIRAkX/AJ0fTY4IwDBVPP/VWvxFZVPdBJ9dEwCfTFDV IsG1nUkpU38Gd/i0RBfSqs8= =hKOS - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBO9AzJyh9+71yA2DNAQGbhgP8D+U7FxuZlW5xfnyZG06Mw0s7Z+u0CKU3 n4t+k2Yae1ntOFuWBYxpWi5dF1uO7Lw5+ST3Xg+omZ4XlO3Uob75dpfbquW0TJ0w a0UB9K1uLYF+N7WwVa9LuiZ2u9+SkycIs31fBRHEhctrjTUEX4MlDdusxBNT+qWb V+kme+gYsZU= =SOYB -----END PGP SIGNATURE-----