Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2006.0376 -- [UNIX/Linux][Debian] New lynx and lynx-ssl packages fix denial of service 31 May 2006 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: lynx lynx-ssl Publisher: Debian Operating System: Debian GNU/Linux 3.1 Debian GNU/Linux 3.0 UNIX variants (UNIX, Linux, OSX) Impact: Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2004-1617 Original Bulletin: http://www.debian.org/security/2006/dsa-1076 http://www.debian.org/security/2006/dsa-1077 Comment: Note that there are two Debian advisories in this bulletin - one containing information regarding lynx, the other for lynx-ssl. This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running Lynx check for an updated version of the software for their operating system at http://lynx.isc.org. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 1076-1 security@debian.org http://www.debian.org/security/ Martin Schulze May 26th, 2006 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : lynx Vulnerability : programming error Problem type : remote Debian-specific: no CVE ID : CVE-2004-1617 BugTraq ID : 11443 Debian Bug : 296340 Michal Zalewski discovered that lynx, the popular text-mode WWW Browser, is not able to grok invalid HTML including a TEXTAREA tag with a large COLS value and a large tag name in an element that is not terminated, and loops forever trying to render the broken HTML. For the old stable distribution (woody) this problem has been fixed in version 2.8.4.1b-3.4. For the stable distribution (sarge) this problem has been fixed in version 2.8.5-2sarge2. For the unstable distribution (sid) this problem has been fixed in version 2.8.5-2sarge2. We recommend that you upgrade your lynx package. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4.dsc Size/MD5 checksum: 581 a9853909c61c5ef2fcc8868599f9b875 http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4.diff.gz Size/MD5 checksum: 16334 74bce8912c28f979c33055a012cf29d6 http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b.orig.tar.gz Size/MD5 checksum: 2557510 053a10f76b871e3944c11c7776da7f7a Alpha architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4_alpha.deb Size/MD5 checksum: 1610344 3e1ec04a0c6532506519e8051a0067b6 ARM architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4_arm.deb Size/MD5 checksum: 1487906 a06ad20f4d8a0ce1cc0d59a0dfa24e9b Intel IA-32 architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4_i386.deb Size/MD5 checksum: 1444914 cb6449afd1e3029d06606bf823e0f064 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4_ia64.deb Size/MD5 checksum: 1762966 cb0b05d5cb148372fd2cd3d2e99843cc HP Precision architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4_hppa.deb Size/MD5 checksum: 1555454 79392b2914654a7d4519247d9584e816 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4_m68k.deb Size/MD5 checksum: 1405980 1df4dff2fc4191ee512811e0ac42c361 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4_mips.deb Size/MD5 checksum: 1508022 d5b58fc5611b1ea1d37bc5a1034478f1 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4_mipsel.deb Size/MD5 checksum: 1504120 1078ef11583d9664fecd2d9d5712ecad PowerPC architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4_powerpc.deb Size/MD5 checksum: 1491256 2967d2f0c3a722b4b42a2b06510aabcc IBM S/390 architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4_s390.deb Size/MD5 checksum: 1463536 5a5692d6d572ef301d052e7e8c62d004 Sun Sparc architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.4_sparc.deb Size/MD5 checksum: 1492926 6bb21df62a773736a1f694cedacea3de Debian GNU/Linux 3.1 alias sarge - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2.dsc Size/MD5 checksum: 616 241c00a777c333b7270d8dbdaa4ad210 http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2.diff.gz Size/MD5 checksum: 17357 22b394977569bbeda207bfb5bcb42175 http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5.orig.tar.gz Size/MD5 checksum: 2984352 5f516a10596bd52c677f9bfd9579bc28 Alpha architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2_alpha.deb Size/MD5 checksum: 1994618 4a23d6234470f59a47100bcd13d18a51 AMD64 architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2_amd64.deb Size/MD5 checksum: 1881876 046312043fffdbcf5ad218074e21e119 ARM architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2_arm.deb Size/MD5 checksum: 1853176 0d33e5835a479accab8c3282cdc19c14 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2_i386.deb Size/MD5 checksum: 1854894 1e525c61aac1e0fac0ddad4d9e15d8f6 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2_ia64.deb Size/MD5 checksum: 2128572 78bfa4c383e41d352b67595da80904c9 HP Precision architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2_hppa.deb Size/MD5 checksum: 1909746 371fb69c98ff2e510861ba210ec11bda Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2_m68k.deb Size/MD5 checksum: 1780836 bdf8b0d6a711cf21202ef86189cfb8bf Big endian MIPS architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2_mips.deb Size/MD5 checksum: 1894118 9be5baba4f5e3f99b618553c4252b289 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2_mipsel.deb Size/MD5 checksum: 1889604 11840739365387bb4741099f9310c77c PowerPC architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2_powerpc.deb Size/MD5 checksum: 1878302 4885a52c8ad1992335f5c9f87ef522cf IBM S/390 architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2_s390.deb Size/MD5 checksum: 1866982 8125a8d85817c29d3984fdb2d2ac4df6 Sun Sparc architecture: http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge2_sparc.deb Size/MD5 checksum: 1861484 407b283a4c8656a0ef1a5935780c8204 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEdwhJW5ql+IAeqTIRAr+IAJ9Qn7H5oFJJYyZuN8oaxgUXsZAy+ACgjRn7 aWMRPJtnJ5Xf2D5V0OuRTic= =n7+V - -----END PGP SIGNATURE----- - ---------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 1077-1 security@debian.org http://www.debian.org/security/ Martin Schulze May 26th, 2006 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : lynx-ssl Vulnerability : programming error Problem type : remote Debian-specific: no CVE ID : CVE-2004-1617 BugTraq ID : 11443 Debian Bug : 296340 Michal Zalewski discovered that lynx, the popular text-mode WWW Browser, is not able to grok invalid HTML including a TEXTAREA tag with a large COLS value and a large tag name in an element that is not terminated, and loops forever trying to render the broken HTML. The same code is present in lynx-ssl. For the old stable distribution (woody) this problem has been fixed in version 2.8.4.1b-3.3. The stable distribution (sarge) does not contain lynx-ssl packages anymore. The unstable distribution (sid) does not contain lynx-ssl packages anymore. We recommend that you upgrade your lynx-ssl package. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3.dsc Size/MD5 checksum: 611 7ee1218eb5536e5a79b644dd7b56af53 http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3.diff.gz Size/MD5 checksum: 89483 c46454ac050fff129e77eb0f4b151517 http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b.orig.tar.gz Size/MD5 checksum: 2557510 053a10f76b871e3944c11c7776da7f7a Alpha architecture: http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3_alpha.deb Size/MD5 checksum: 1617522 9dd7997b45df6331c660e2afca324840 ARM architecture: http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3_arm.deb Size/MD5 checksum: 1491938 de3a7656d192e5bca1cb9d3bd1ff84ff Intel IA-32 architecture: http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3_i386.deb Size/MD5 checksum: 1450298 ef8c2a423c1530b21a79a834776abba7 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3_ia64.deb Size/MD5 checksum: 1769276 ad79ec138883ce575cb528346fb7b074 HP Precision architecture: http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3_hppa.deb Size/MD5 checksum: 1559678 4e725d8701a1721784d490f000da3199 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3_m68k.deb Size/MD5 checksum: 1410804 f8a1018bc195fc4972cff586e9694163 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3_mips.deb Size/MD5 checksum: 1512074 5c395f3cbda76895a061e79913633853 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3_mipsel.deb Size/MD5 checksum: 1508018 ead159d28f1fb4a60f25e077e4c122f0 PowerPC architecture: http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3_powerpc.deb Size/MD5 checksum: 1497258 512c921d1ef663439d51b4ba7cc203ef IBM S/390 architecture: http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3_s390.deb Size/MD5 checksum: 1468830 7ccab81df77cd4ffd0553707adf820a6 Sun Sparc architecture: http://security.debian.org/pool/updates/main/l/lynx-ssl/lynx-ssl_2.8.4.1b-3.3_sparc.deb Size/MD5 checksum: 1497292 40f28922fce6ad486d5c46c56fa822f1 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEdwppW5ql+IAeqTIRAnH0AJ9itUR08kT/AxhdIrAA39hLvg2KWwCfcttV Vfnx+Xb2zTHFV+lSuan0vzw= =MxOG - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRHzfhSh9+71yA2DNAQLEGgP/UyIaxJcm96MWtkosodehDjgZqoffVkYo o+CWa0vyDPLi+eMvfSZM/g/oTIXEp54+4beE6VS8N2xgSUs8E2Loho7GYvB5zPuy tsU2FNtUno0vpZANmVuPEFYgjwsll8GF/DkGlXc7uWY+GtpHBdrJENP53KvP9JU5 kws9D8TNnmY= =fAKa -----END PGP SIGNATURE-----