-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2004.0285 -- Debian Security Advisory DSA 487-1
            New neon packages fix format string vulnerabilities
                               19 April 2004

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                neon
Publisher:              Debian
Operating System:       Debian GNU/Linux 3.0
                        Linux
Impact:                 Execute Arbitrary Code/Commands
Access Required:        Remote
CVE Names:              CAN-2004-0179

Ref:                    ESB-2004.0281

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 487-1                     security@debian.org
http://www.debian.org/security/                             Matt Zimmerman
April 16th, 2004                         http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : neon
Vulnerability  : format string
Problem-Type   : remote
Debian-specific: no
CVE Ids        : CAN-2004-0179

Multiple format string vulnerabilities were discovered in neon, an
HTTP and WebDAV client library.  These vulnerabilities could
potentially be exploited by a malicious WebDAV server to execute
arbitrary code with the privileges of the process using libneon.

For the current stable distribution (woody) these problems have been
fixed in version 0.19.3-2woody3.

For the unstable distribution (sid), these problems have been fixed in
version 0.24.5-1.

We recommend that you update your neon package.

Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/n/neon/neon_0.19.3-2woody3.dsc
      Size/MD5 checksum:      582 4753d19632b3ba69e7d97f61b21da8b1
    http://security.debian.org/pool/updates/main/n/neon/neon_0.19.3-2woody3.diff.gz
      Size/MD5 checksum:     4081 6ed8f310baae56db47a34f3affdf0dd5
    http://security.debian.org/pool/updates/main/n/neon/neon_0.19.3.orig.tar.gz
      Size/MD5 checksum:   499574 9dbb8c276e5fc58a707b6e908abdce63

  Alpha architecture:

    http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_alpha.deb
      Size/MD5 checksum:   122054 f8455a4aca0ad0eed97b8635f7552ecc
    http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_alpha.deb
      Size/MD5 checksum:    77894 12283440f135e0b68b328151c78d5240

  ARM architecture:

    http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_arm.deb
      Size/MD5 checksum:   100820 6ac65c11b484429f9f388ae0bab9136c
    http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_arm.deb
      Size/MD5 checksum:    70256 d16830700754df93ec06fcc72d952be6

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_i386.deb
      Size/MD5 checksum:    94820 7a7f0c168b101390a619ffde40f9efc3
    http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_i386.deb
      Size/MD5 checksum:    65780 b72a10b0dbcbfb149b36b3053627a9d2

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_ia64.deb
      Size/MD5 checksum:   131246 dda199f3b1d6598bb8aa2f6ba37521d4
    http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_ia64.deb
      Size/MD5 checksum:    96250 043f6b4d3eb394bcaa2b7dda6a78b676

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_hppa.deb
      Size/MD5 checksum:   118574 d7904398181654ebc8eab408a2d96cec
    http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_hppa.deb
      Size/MD5 checksum:    80776 fdb1f1e337ee50318cbccfeeda0ec32f

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_m68k.deb
      Size/MD5 checksum:    93110 7993e9e642cbefb27ea6a7085615bb55
    http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_m68k.deb
      Size/MD5 checksum:    67668 fc37364b5b44454a637b69b591ce8c04

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_mips.deb
      Size/MD5 checksum:   110704 3fbe497c5ac44aee13457fcfe9b785cf
    http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_mips.deb
      Size/MD5 checksum:    68644 29c7188a9dfe0da26a218eea6714997b

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_mipsel.deb
      Size/MD5 checksum:   110502 73eb5e6338f9ce6f5fd0c0cd27cbac48
    http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_mipsel.deb
      Size/MD5 checksum:    68626 f85bcdab3e2957d53f00569966eaa3b6

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_powerpc.deb
      Size/MD5 checksum:   107168 c1994dba85b7e2150b1419fd4da44a14
    http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_powerpc.deb
      Size/MD5 checksum:    71544 5e1812c5242835b7567d3549a334d9d8

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_s390.deb
      Size/MD5 checksum:    96930 022ad2200a279efc9ab1482e599b47d3
    http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_s390.deb
      Size/MD5 checksum:    70958 632017c6cd495f5a35a3ced63f2bab88

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody3_sparc.deb
      Size/MD5 checksum:   102406 d3e5c72b6de6f90f2272c62d4ee3c88c
    http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody3_sparc.deb
      Size/MD5 checksum:    70812 c36ba230074c19cb6a58b76da986767d

  These files will probably be moved into the stable distribution on
  its next revision.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAgIvnArxCt0PiXR4RApfuAKCt2oOR9eVtHZ+dNQa+TKcwPg3KsQCeL/XY
SMQaQv3rFavZa+15mC+QKRI=
=WO2I
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQIMdWCh9+71yA2DNAQJTwwP+L6uX115aA9PC/YJoFsnzEAuPnemLSbg2
S5WowOUEXQHn3Y73xcS8Nc0djWyjaCjiJiWiPazOjueMa2ackzOKdtZPuWJX6bfZ
20QaH32IptvRVF2Qx9CvaLVIZnwAyVF4yC7h3BIMHyxbKU5zPPJ3GC90j2sk9EXo
67Bx1VpgTbg=
=Yo4p
-----END PGP SIGNATURE-----