Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2008.0510 -- [UNIX/Linux][Debian] New netpbm-free packages fix arbitrary code execution 19 May 2008 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: netpbm-free Publisher: Debian Operating System: Debian GNU/Linux 4.0 UNIX variants (UNIX, Linux, OSX) Impact: Execute Arbitrary Code/Commands Access: Remote/Unauthenticated CVE Names: CVE-2008-0554 Original Bulletin: http://www.debian.org/security/2008/dsa-1579 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running netpbm-free check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ Debian Security Advisory DSA-1579-1 security@debian.org http://www.debian.org/security/ Devin Carraway May 18, 2008 http://www.debian.org/security/faq - - ------------------------------------------------------------------------ Package : netpbm-free Vulnerability : insufficient input sanitizing Problem type : local (remote) Debian-specific: no CVE Id(s) : CVE-2008-0554 A vulnerability was discovered in the GIF reader implementation in netpbm-free, a suite of image manipulation utilities. Insufficient input data validation could allow a maliciously-crafted GIF file to overrun a stack buffer, potentially permitting the execution of arbitrary code. For the stable distribution (etch), these problems have been fixed in version 2:10.0-11.1+etch1. For the unstable distribution (sid), these problems were fixed in version 2:10.0-11.1. We recommend that you upgrade your netpbm packages. Upgrade instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 4.0 alias etch - - ------------------------------- Source archives: http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm-free_10.0-11.1+etch1.diff.gz Size/MD5 checksum: 49833 5e340881bb56e88ca2525c5baf3a12cf http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm-free_10.0.orig.tar.gz Size/MD5 checksum: 1926538 985e9f6d531ac0b2004f5cbebdeea87d http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm-free_10.0-11.1+etch1.dsc Size/MD5 checksum: 755 e8b82a4cab1e4352faf53d6093ff02d1 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_alpha.deb Size/MD5 checksum: 84206 b33236e6b1bfd895231905579583ec1c http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_alpha.deb Size/MD5 checksum: 139256 4dde0418859c0a44e8abbd5a8888bc97 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_alpha.deb Size/MD5 checksum: 75730 5ba8dac319fcb09e6057edcf339031da http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_alpha.deb Size/MD5 checksum: 1423650 928d158de222f0aad537d2e9d5a55d1c http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_alpha.deb Size/MD5 checksum: 138864 d72de0e9205fafc74ed5a61574f90a89 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_amd64.deb Size/MD5 checksum: 75412 c87cf158e0234259584f584a9f1832b5 http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_amd64.deb Size/MD5 checksum: 1241558 470cca7fe0cafa9a3ef519e45911989f http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_amd64.deb Size/MD5 checksum: 116838 1444d40f6022a1650c8ebcf5041ba6ef http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_amd64.deb Size/MD5 checksum: 67404 c11ac33a59b828227df65f030d4b0ecd http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_amd64.deb Size/MD5 checksum: 117288 aa57bddc977bfcaae40c4d2e0dfab247 arm architecture (ARM) http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_arm.deb Size/MD5 checksum: 62288 4f73d9da53ef5fca46b720787b69a937 http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_arm.deb Size/MD5 checksum: 1260142 3aad360491069ca71cb1fd79a54047b3 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_arm.deb Size/MD5 checksum: 109834 a9b24a209be2c2a05183d5a501981669 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_arm.deb Size/MD5 checksum: 68692 02d48f5f058f67b7d2007332c214211d http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_arm.deb Size/MD5 checksum: 110104 7e35448f17f029ad74902589aae0c0c5 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_hppa.deb Size/MD5 checksum: 1333920 a56ad3bc6edba6f0c8aeeb90a05b24ae http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_hppa.deb Size/MD5 checksum: 82594 68fa87cdf4869bc89047fe0ad48cb1cf http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_hppa.deb Size/MD5 checksum: 125684 7df0ea27cbd816e3c4846bd4714907c4 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_hppa.deb Size/MD5 checksum: 125788 49bdc7c577ccfee26adfd44187e7098d http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_hppa.deb Size/MD5 checksum: 73896 5cd54f6760f1d0a74899aa5b1eeeefee i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_i386.deb Size/MD5 checksum: 63758 f905f22588b614831324060426e5751d http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_i386.deb Size/MD5 checksum: 1181300 365c86b4233a807c3c6c10f800da4afa http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_i386.deb Size/MD5 checksum: 70202 591a522cb5cc225858e8ef59c0b0229e http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_i386.deb Size/MD5 checksum: 109860 c1011f89b554328ff82cd01451e667c1 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_i386.deb Size/MD5 checksum: 109718 c1130da9304e855827b99d4c2202a5b2 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_ia64.deb Size/MD5 checksum: 101310 e695256a27385dee8fb2f8ddf1ccb151 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_ia64.deb Size/MD5 checksum: 92042 a2df3ed51d279ad0191401d7db0a29de http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_ia64.deb Size/MD5 checksum: 1759566 1f58b0302e2394d09bf3fcc423ee77ec http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_ia64.deb Size/MD5 checksum: 149610 8458ab3ca7477d7011b815e31651a74a http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_ia64.deb Size/MD5 checksum: 149986 dc3f0e6f5e4511c5970a0bcd726d8f3b mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_mips.deb Size/MD5 checksum: 124128 fad3edf3cf23f0bf7d13660bbb02795e http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_mips.deb Size/MD5 checksum: 123212 5331c9d21f4e49029a2d6afc8e88fbcd http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_mips.deb Size/MD5 checksum: 73522 ff8075e6113bf9f387798a142c8d07a8 http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_mips.deb Size/MD5 checksum: 1318050 688e833af5f7ed3dcaf6c8b803acab6b http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_mips.deb Size/MD5 checksum: 65826 f6f9b8c34d1fc3ecb332baf87144cc67 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_mipsel.deb Size/MD5 checksum: 123410 7e7c4c3649a11e6c5d2bac60511a2608 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_mipsel.deb Size/MD5 checksum: 65710 dff78e7f50f68e0e942323af94c69af5 http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_mipsel.deb Size/MD5 checksum: 1297700 ed5a3f2a53460072beae27697d68bb31 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_mipsel.deb Size/MD5 checksum: 72604 b5a39f3389ede6a53b330e761db9d0e8 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_mipsel.deb Size/MD5 checksum: 123830 2593cde97437a5d9c33ac978a948bbeb powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_powerpc.deb Size/MD5 checksum: 119758 e917d3ac53867792653b8a7d2d090824 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_powerpc.deb Size/MD5 checksum: 79014 ee2fd0a785658b116b877f951b8e1531 http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_powerpc.deb Size/MD5 checksum: 1448810 c24163baecf73aa5452954e1f4c04b05 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_powerpc.deb Size/MD5 checksum: 119366 26fc1ef0d6d24cc8c0ea956b9cc12f9c http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_powerpc.deb Size/MD5 checksum: 68122 8ef7a20dc73a9e293cf5b15bf33ead0d s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_s390.deb Size/MD5 checksum: 1245934 825184a22f4476b277cade23ec93cbf5 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_s390.deb Size/MD5 checksum: 76472 005fc9caafb6eb047701e3f5272d0bbe http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_s390.deb Size/MD5 checksum: 114788 ba4a56d368c612f161f3e0c983e98bd6 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_s390.deb Size/MD5 checksum: 115006 4c1b4a388455a0725771dfb5c73f8ddc http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_s390.deb Size/MD5 checksum: 69900 bf8bf3369a29c340eb035413034cccae sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9-dev_10.0-11.1+etch1_sparc.deb Size/MD5 checksum: 111782 e2553ed79f836d8fa1dc25422ba8aa95 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm9_10.0-11.1+etch1_sparc.deb Size/MD5 checksum: 68808 4ee6c9653cd560ec0074275b457202b7 http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10-dev_10.0-11.1+etch1_sparc.deb Size/MD5 checksum: 111562 e126024c8567d3140c240e60ecc390dc http://security.debian.org/pool/updates/main/n/netpbm-free/netpbm_10.0-11.1+etch1_sparc.deb Size/MD5 checksum: 1204234 85d633a743c51efea0122caa7e12c6ea http://security.debian.org/pool/updates/main/n/netpbm-free/libnetpbm10_10.0-11.1+etch1_sparc.deb Size/MD5 checksum: 62992 efe34ea795e4c875ab65c28f413a590f These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iQEUAwUBSC/2iWz0hbPcukPfAQLyPgf2MvGbXy5foPi9uyzUu1beoK4VwMVBv2Fp McQJv2NyEeJ2zhI6Axnk0EFKLNyATvPVoHkSF4IGBhqW9inR40AMVwRgLDsDvWsw S3R/xfd+0JnIhyc+i+lOxNbT9fUlZTfTVnot4IKKf9WMg7vAdBcj3VEAopr+4dTh cHQ0GJeIYb5EUriwxv3dR7gRgKE8UI1EFVdDMj8y49hAgtGIZ4kbGplVxabLp0Pw sOPZir7jPrJ3OTSVuT3IUGtu52o232BJpSmFSJ1fkQFXhqjSgrlqG+WdlqHnzXxV lRVsk1APdvD5OFJ7MBKrKNe3sQmiVb2WUbWN8yB9mYOn1TmTXgCz =XTgI - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBSDDJWCh9+71yA2DNAQK0bwP/Q4SfHAv6nLPTIt8Oru9rNFWZ09Lz9zki ic9bZsdLrHISsQpxddgZFmEz9yE6tv33ZCJHj8kC/yIY+VlmObjWZm9QbAG4IgLa xs/lzxndjlsPhHwBtfZMHLfyWO24giaejfhdWdLqKDHXKS1zP1eZOY/FfKO0/sTp nkRgCyMEMUQ= =/h0P -----END PGP SIGNATURE-----