-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2008.0574 -- [Debian]
            New libvorbis packages fix several vulnerabilities
                                4 June 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              libvorbis
Publisher:            Debian
Operating System:     Debian GNU/Linux 4.0
Impact:               Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-1423 CVE-2008-1420 CVE-2008-1419

Ref:                  ESB-2008.0506

Original Bulletin:    http://www.debian.org/security/2008/dsa-1591

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1591-1                  security@debian.org
http://www.debian.org/security/                          Thijs Kinkhorst
June 03, 2008                         http://www.debian.org/security/faq
- - ------------------------------------------------------------------------

Package        : libvorbis
Vulnerability  : several
Problem type   : local (remote)
Debian-specific: no
CVE Id(s)      : CVE-2008-1419 CVE-2008-1420 CVE-2008-1423
Debian Bug     : 482518

Several local (remote) vulnerabilities have been discovered in libvorbis,
a library for the Vorbis general-purpose compressed audio codec. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2008-1419

    libvorbis does not properly handle a zero value which allows remote
    attackers to cause a denial of service (crash or infinite loop) or
    trigger an integer overflow.

CVE-2008-1420

    Integer overflow in libvorbis allows remote attackers to execute
    arbitrary code via a crafted OGG file, which triggers a heap overflow.

CVE-2008-1423

    Integer overflow in libvorbis allows remote attackers to cause a denial
    of service (crash) or execute arbitrary code via a crafted OGG file
    which triggers a heap overflow.

For the stable distribution (etch), these problems have been fixed in version
1.1.2.dfsg-1.4.

For the unstable distribution (sid), these problems have been fixed in
version 1.2.0.dfsg-3.1. 

We recommend that you upgrade your libvorbis package.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- - -------------------------------

Source archives:

  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.1.2.dfsg-1.4.dsc
    Size/MD5 checksum:      787 2f0bfd28fb368c43c56332e7de7a2e3d
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.1.2.dfsg.orig.tar.gz
    Size/MD5 checksum:  1312540 44cf09fef7f78e7c6ba7dd63b6137412
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis_1.1.2.dfsg-1.4.diff.gz
    Size/MD5 checksum:    15782 62527e6adcff1dca42018a0252b19b91

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4_alpha.deb
    Size/MD5 checksum:    94500 edb2728b48cd6fc0357f62a7dc8fca5c
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4_alpha.deb
    Size/MD5 checksum:   110468 8273babee8a08c373671b468469b2ede
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4_alpha.deb
    Size/MD5 checksum:    19202 925dfba3f212e8b69c760c433b119716
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4_alpha.deb
    Size/MD5 checksum:   494958 0052fe78f4be43cb9a7f42ea2b25f7fe

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4_amd64.deb
    Size/MD5 checksum:    17790 f49da89a8b972614687f3a5e2f6c5bac
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4_amd64.deb
    Size/MD5 checksum:    93498 241499415b96f3e348d1ec9c66a45981
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4_amd64.deb
    Size/MD5 checksum:   101508 63e1e8392876a822dc664e21b19e0185
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4_amd64.deb
    Size/MD5 checksum:   468670 8c6c80eb7b8e7f8b49be1447357ebce1

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4_arm.deb
    Size/MD5 checksum:    75744 03dad28341cde24fbbfd20444bf346c2
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4_arm.deb
    Size/MD5 checksum:    18528 508cb939f65a367447c44add9dd8c11a
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4_arm.deb
    Size/MD5 checksum:    98190 a09c2d3021f7b9d2d9b2bf04b2d30957
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4_arm.deb
    Size/MD5 checksum:   458578 6dcadbb28c56a0a9368bfcd67b28d3fa

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4_hppa.deb
    Size/MD5 checksum:   483196 0435784553fb2b9c08c915da58c3c7e1
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4_hppa.deb
    Size/MD5 checksum:    21978 6ade3e3b040f8e01c4fe023df6faf2de
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4_hppa.deb
    Size/MD5 checksum:   108084 7d263ee14d29b787b0f32710ae2bffdf
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4_hppa.deb
    Size/MD5 checksum:    92430 72180513d203103e56e4929ca6da035f

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4_i386.deb
    Size/MD5 checksum:   453652 55bc31f817b6806d19d8f0696cc288cd
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4_i386.deb
    Size/MD5 checksum:    18884 5d4f1bccf5efa0d5ba5767b49f97d253
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4_i386.deb
    Size/MD5 checksum:    75346 f11509bd2b430f8be62706a13748d6bc
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4_i386.deb
    Size/MD5 checksum:    98176 d5b46716c8ab083b9c00b523a73a81b9

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4_ia64.deb
    Size/MD5 checksum:    98022 dabf436427e867a81074bdca0c53ef6e
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4_ia64.deb
    Size/MD5 checksum:   510180 1c4e1c58e7d63f10ff7efaf3a6555f46
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4_ia64.deb
    Size/MD5 checksum:    24700 8dadf685db0738f52c4b47420eff588a
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4_ia64.deb
    Size/MD5 checksum:   136046 b5d657cad9154915f0a9c0779e68cf1c

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4_mips.deb
    Size/MD5 checksum:   104986 3d6d14fff3621ed344e88e7bb57ae627
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4_mips.deb
    Size/MD5 checksum:    81588 e776156e4d5647f0aa591ea8b01d3aad
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4_mips.deb
    Size/MD5 checksum:    20946 5f5eca06d6b715087a4298d2db944fcf
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4_mips.deb
    Size/MD5 checksum:   479286 4a9404dab651fd387901d6eb223bd835

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4_mipsel.deb
    Size/MD5 checksum:    76982 63638be1a06154fa1126e5be3a4ac95e
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4_mipsel.deb
    Size/MD5 checksum:   469086 9c31f061ab04690bf52876821a9383ea
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4_mipsel.deb
    Size/MD5 checksum:    20944 5f59636c00cbe76590ac1ef23235cd8d
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4_mipsel.deb
    Size/MD5 checksum:   104948 be1bf5fd730d239f5cd62a92cd4b75e4

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4_powerpc.deb
    Size/MD5 checksum:   105760 ba397af813b092de9bea72accb46db4b
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4_powerpc.deb
    Size/MD5 checksum:    21394 7e12a198ce7bed6922d20da108e5bad5
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4_powerpc.deb
    Size/MD5 checksum:    82558 1299949b45c3a6fdba4fa64fcf48dc53
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4_powerpc.deb
    Size/MD5 checksum:   475206 7cda1ebdffc9b47d90efa594bea5d5b8

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4_s390.deb
    Size/MD5 checksum:   452736 403af241544bf4fd66f4993003f0f192
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4_s390.deb
    Size/MD5 checksum:    90546 f2f4a9e7410b946b91c4d44cef18f5af
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4_s390.deb
    Size/MD5 checksum:   102548 ad43cb11ddff398ee0a83ded1a024321
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4_s390.deb
    Size/MD5 checksum:    20920 7ffdc1f9962394073efae81356780428

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis0a_1.1.2.dfsg-1.4_sparc.deb
    Size/MD5 checksum:    98252 fad4afe3566e986fe819a0fff6a2376e
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbis-dev_1.1.2.dfsg-1.4_sparc.deb
    Size/MD5 checksum:   453410 ce3775bb59d55b9ba7e34469225e0d20
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisfile3_1.1.2.dfsg-1.4_sparc.deb
    Size/MD5 checksum:    17888 4eaf8a0cfd4f3b1c6f8332ccf1bf6ef4
  http://security.debian.org/pool/updates/main/libv/libvorbis/libvorbisenc2_1.1.2.dfsg-1.4_sparc.deb
    Size/MD5 checksum:    79796 57795226ac31a7b5bf7793e4e14dc89a


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBSEUOemz0hbPcukPfAQKlCwf/RNQkhN5GiXzWbIPQDNuXCa9Gri63UI6Z
yUpFdhpcitk0JKDznD67BwrVjEFOOhInCDMiVftX53oAGoUhW/kEbQ4A+gzqf9cJ
B6OfyEjzV9JLEZ5OMlRQCigQpbUqQVwx6ISBM/RuzbuQSXEpYtUPztPAqHmVZDdU
WjiVKEioP6T64ql9xxEu15ekuWJpcaglkHSOEGPmJZwP/9sLCQrVUwciMSWR/fr+
kdV47I292yfyhdVMnmszpncAtO1ZWAyDV8DZS2yMXlqxfK/nMadz4PWj39gISr6e
677OU3WzrE+tj7hKGvutvivwTEzNzhrHq5/oYFnQn/mgoHfgKFsNlQ==
=52+x
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBSEXNPih9+71yA2DNAQKj6AQAgsLS23+fO/voGBJsAprEY6Lj786UE7XY
rmbhidGLH3/ftlcDOymEA69Zor6Gkt8UqbkY88fKw9BAUTUoz9yHZwgSz0ODs75Q
i9gSoYQB6eQwmb9rRfSmc/bHKhnJUhaREg4v1zCg13NQqs7ZCKp5tPLaOwjqgFNQ
mPXuJ63D1uA=
=Sjcb
-----END PGP SIGNATURE-----