Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2009.0254 -- [UNIX/Linux][Debian] New weechat packages fix denial of service 19 March 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: weechat Publisher: Debian Operating System: Debian GNU/Linux UNIX variants (UNIX, Linux, OSX) Impact: Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2009-0661 Original Bulletin: http://www.debian.org/security/2009/dsa-1744 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running weechat check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA-1744-1 security@debian.org http://www.debian.org/security/ Nico Golde March 18th, 2009 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : weechat Vulnerability : missing input sanitization Problem type : remote Debian-specific: no CVE ID : CVE-2009-0661 Debian Bug : 519940 BugTraq ID : 34148 Sebastien Helleu discovered that an error in the handling of color codes in the weechat IRC client could cause an out-of-bounds read of an internal color array. This can be used by an attacker to crash user clients via a crafted PRIVMSG command. The weechat version in the oldstable distribution (etch) is not affected by this problem. For the stable distribution (lenny), this problem has been fixed in version 0.2.6-1+lenny1. For the testing distribution (squeeze), this problem will be fixed soon. For the unstable distribution (sid), this problem has been fixed in version 0.2.6.1-1. We recommend that you upgrade your weechat packages. Upgrade instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 5.0 alias lenny - - -------------------------------- Debian (stable) - - --------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/w/weechat/weechat_0.2.6.orig.tar.gz Size/MD5 checksum: 1615289 96fec32d773e650fed0eb21d51a9a945 http://security.debian.org/pool/updates/main/w/weechat/weechat_0.2.6-1+lenny1.diff.gz Size/MD5 checksum: 2987 5a823583d320e0112fbf6f65c8d9d5a9 http://security.debian.org/pool/updates/main/w/weechat/weechat_0.2.6-1+lenny1.dsc Size/MD5 checksum: 1288 95517e879e64485b1d8d2f0d93c231dc Architecture independent packages: http://security.debian.org/pool/updates/main/w/weechat/weechat_0.2.6-1+lenny1_all.deb Size/MD5 checksum: 19814 3dc3c119f404e9c06f01a2433058431e http://security.debian.org/pool/updates/main/w/weechat/weechat-common_0.2.6-1+lenny1_all.deb Size/MD5 checksum: 431768 8ba3ac668a829fcb4a5bdeb282249fc8 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_amd64.deb Size/MD5 checksum: 214810 96cd728e453b0e2c24681fbdd51c376f http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_amd64.deb Size/MD5 checksum: 119354 c6f0ac09b5ee2b32d3fabf7515501c4a arm architecture (ARM) http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_arm.deb Size/MD5 checksum: 192764 1ba5ba2f44affa3ea338cd230acde438 http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_arm.deb Size/MD5 checksum: 106736 f395304b5289245684ec30837bded1c1 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_armel.deb Size/MD5 checksum: 195740 39cfcdb47694c7883979d2da7ab619aa http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_armel.deb Size/MD5 checksum: 108830 ea4f281358563ac7e3cc396f0ee10501 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_hppa.deb Size/MD5 checksum: 223536 a83b056f959796e74629b5efd3617616 http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_hppa.deb Size/MD5 checksum: 130270 7451de93d928fbd453eaf3a95dde1b65 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_i386.deb Size/MD5 checksum: 107776 ec239c51343e0ace3479559d9d7eaa7b http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_i386.deb Size/MD5 checksum: 189350 c95243a796896dde0b87f0da1aecfc7d ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_ia64.deb Size/MD5 checksum: 149346 8f430bd31e411583fdbca07a11f9be27 http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_ia64.deb Size/MD5 checksum: 315132 4a2f20117d12ccf245c798f7ed77da50 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_mips.deb Size/MD5 checksum: 214212 bae1939afacb219991d1a96ba79fd61c http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_mips.deb Size/MD5 checksum: 95196 6bb1cc04140c54080782765e2449dbe3 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_mipsel.deb Size/MD5 checksum: 214114 a37aa2884f081d654caceda230c19fab http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_mipsel.deb Size/MD5 checksum: 94412 8cdd416097d5c5c7a3372cf74fe0868e powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_powerpc.deb Size/MD5 checksum: 213552 b6388948dd607888576328cfab3d5ffe http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_powerpc.deb Size/MD5 checksum: 130426 5dad2dd2db74cd00cbcd8f408a607a23 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_s390.deb Size/MD5 checksum: 208666 c5e3a27466af91c297fb11187fe1fb31 http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_s390.deb Size/MD5 checksum: 112248 921633d25598e4db478f8623a1b509e2 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_sparc.deb Size/MD5 checksum: 188520 f7354ec16c2629cc2ca8976afe5fd057 http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_sparc.deb Size/MD5 checksum: 109596 0d6bf31e83729c47b7598aee5d3f87e0 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAknA4RgACgkQHYflSXNkfP8KoACeLU43jCX5NRfWquvJhSzTMQOC TNYAoIq0vrmPnTfSzp616AUrkIl5ZMAu =gaRd - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFJwZ4aNVH5XJJInbgRAuk7AJ4sDl9mLnvqAWNoH6CiqXXyCp6eyACbBqLj fa2Vm/0aMWY3IVlSMD9hPVQ= =7Jqa -----END PGP SIGNATURE-----