Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2003.0630 -- Debian Security Advisory DSA-378-1 New mah-jong packages fix buffer overflows, denial of service 08 September 2003 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: mah-jong Publisher: Debian Operating System: Debian GNU/Linux 3.0 Linux Impact: Execute Arbitrary Code/Commands Denial of Service Access Required: Remote CVE Names: CAN-2003-0705, CAN-2003-0706 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 378-1 security@debian.org http://www.debian.org/security/ Matt Zimmerman September 7th, 2003 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : mah-jong Vulnerability : buffer overflows, denial of service Problem-Type : remote Debian-specific: no CVE Ids : CAN-2003-0705 CAN-2003-0706 Nicolas Boullis discovered two vulnerabilities in mah-jong, a network-enabled game. - CAN-2003-0705 (buffer overflow) This vulnerability could be exploited by a remote attacker to execute arbitrary code with the privileges of the user running the mah-jong server. - - - CAN-2003-0706 (denial of service) This vulnerability could be exploited by a remote attacker to cause the mah-jong server to enter a tight loop and stop responding to commands. For the stable distribution (woody) these problems have been fixed in version 1.4-2. For the unstable distribution (sid) these problems have been fixed in version 1.5.6-2. We recommend that you update your mah-jong package. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2.dsc Size/MD5 checksum: 579 b473dfb32c1765f3b96a1d4897a728a5 http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2.diff.gz Size/MD5 checksum: 23814 c0465cd149b6f9bfc7f0096ab5d0d192 http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4.orig.tar.gz Size/MD5 checksum: 259474 21cc99ddb9ae91cbe02b2119586f8860 Alpha architecture: http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2_alpha.deb Size/MD5 checksum: 311378 0ff83a703283cad7faa06609d330d9ef ARM architecture: http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2_arm.deb Size/MD5 checksum: 272324 e6974d354918f6f4d0dffa3bb3eb4b9f Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2_i386.deb Size/MD5 checksum: 250012 a4f7d586918c3a712d073aa9e8e42bd5 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2_ia64.deb Size/MD5 checksum: 379856 b63ee72a1a2f4ac16e902ae0f8b5b3e1 HP Precision architecture: http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2_hppa.deb Size/MD5 checksum: 286728 c4c544f15f09199b753848cb7ee417d9 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2_m68k.deb Size/MD5 checksum: 234410 91682fc41ab6fb8b57ebfb09681f3180 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2_mips.deb Size/MD5 checksum: 261874 977e1d059bbaca988a3cb60636e74d17 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2_mipsel.deb Size/MD5 checksum: 261666 45e1785dd5c17dcbec971fc8024b8787 PowerPC architecture: http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2_powerpc.deb Size/MD5 checksum: 271566 5d25f219fdb987ca014775ae4ae9ee9c IBM S/390 architecture: http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2_s390.deb Size/MD5 checksum: 246116 be071c93713eb1257f9a8b8225968ad8 Sun Sparc architecture: http://security.debian.org/pool/updates/main/m/mah-jong/mah-jong_1.4-2_sparc.deb Size/MD5 checksum: 269392 78b122c5b4145b039dda06d4e16cfe48 These files will probably be moved into the stable distribution on its next revision. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQE/W7VAArxCt0PiXR4RAlMPAJ9oD49qKrE9OK4LEHnVtA4dCfcM+QCcDPk/ w5fxjmEjVzpNWzgcO/lBpsQ= =t7CW - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBP1wJrih9+71yA2DNAQGnkwP+MjhXdY3PC6nZR25wF1qLe651bVFogkrG vbZK0d8EMYde3EcX6/aBogc6y42Pr9IDkJQ/mUtcAdwZSRNlsCCdlxHv0mHA1JGy tmxeYme6M5QURapKxWG5VyBgTlDlJwpc27QQzMFCq+0pOxcspx0NqfLzA0OZOj5t dYl3LRQWlHA= =FfHj -----END PGP SIGNATURE-----