Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2006.0258 -- [UNIX/Linux][Debian] New kaffeine packages fix arbitrary code execution 6 April 2006 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kaffeine Publisher: Debian Operating System: Debian GNU/Linux 3.1 UNIX variants (UNIX, Linux, OSX) Impact: Execute Arbitrary Code/Commands Access: Remote/Unauthenticated CVE Names: CVE-2006-0051 Original Bulletin: http://www.debian.org/security/2006/dsa-1023 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian It is recommended that administrators running kaffiene check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 1023-1 security@debian.org http://www.debian.org/security/ Martin Schulze April 5th, 2006 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : kaffeine Vulnerability : buffer overflow Problem type : remote Debian-specific: no CVE ID : CVE-2006-0051 Marcus Meissner discovered that kaffeine, a versatile media player for KDE 3, contains an unchecked buffer that can be overwritten remotely when fetching remote RAM playlists which can cause the execution of arbitrary code. The old stable distribution (woody) does not contain kaffeine packages. For the stable distribution (sarge) this problem has been fixed in version 0.6-1sarge1. For the unstable distribution (sid) this problem will be fixed soon. We recommend that you upgrade your kaffeine package. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1.dsc Size/MD5 checksum: 759 41d3e9247746d2ca05fbaf06f8dc5a53 http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1.diff.gz Size/MD5 checksum: 33485 127c21639b5e960cd72b0f1388a1058f http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6.orig.tar.gz Size/MD5 checksum: 2237634 0b0398b1ca6bd19a04a8c647dc8252bd Alpha architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_alpha.deb Size/MD5 checksum: 1488988 200ec5b185b2dbe29fc4743f3f6228bc AMD64 architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_amd64.deb Size/MD5 checksum: 1443844 425d1b8ae1c52e8433cbf9e5e4a2e1ac ARM architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_arm.deb Size/MD5 checksum: 1391900 f100be45d4f40600b65967305d2a360e Intel IA-32 architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_i386.deb Size/MD5 checksum: 1430340 b12cdd0adb1cd8150f6805d5e5f6dd76 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_ia64.deb Size/MD5 checksum: 1579154 491295df2cbf29bb449f079406a55d87 HP Precision architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_hppa.deb Size/MD5 checksum: 1475956 afb0dcc722106c43fed478ad0cafa4f6 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_m68k.deb Size/MD5 checksum: 1398896 852d4c82c346700eee3bafd35fb1eb9c Big endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_mips.deb Size/MD5 checksum: 1387122 a0a28d851754e739cbc5b4882d643a2a Little endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_mipsel.deb Size/MD5 checksum: 1382720 f8506a528a46373b632b1850dfe59597 PowerPC architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_powerpc.deb Size/MD5 checksum: 1398308 69c3fc0cd41ca02e1f04ab34ca1f857e IBM S/390 architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_s390.deb Size/MD5 checksum: 1418478 a3e2444094286bcb1da972e46c416cc2 Sun Sparc architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_sparc.deb Size/MD5 checksum: 1404282 f8e73e88d155a1873d64db720a6ae2d2 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEM4paW5ql+IAeqTIRAlhwAJ97XJ8Cml4mqA7B0vVtfRzDyUm+HgCdEG5P 8sL/vZVYunJBelMO7JBleUo= =+LZX - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRDRsqyh9+71yA2DNAQKuBAP+PD+PUDBWDNp4HVHbFllsoZwmK5XKqfLO DUtMyFnH4XFKdqVAbulRWM3hlMCaVI3Wbk9GApj0lKSrFGMI+UNKy0TfYjv0coyl 9FTiECgbhqpgtqN8qSrSrJ2Ncelx092MY1w7fYroe69z8CmhyukNNzGXlUf5svra f1TsEjxhNOs= =S3O7 -----END PGP SIGNATURE-----