[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 565/04 - Two Debian Advisories:



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 565/04 dated 14.10.04  Time: 14:45  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

Two Debian Advisories:

1. DSA 565-1 - buffer overflow

2. DSA 564-1 - missing user input sanitising


Detail
====== 

1. Ulf Harnhammar has reported two vulnerabilities in SoX, a universal sound sample 
translator, which may be exploited by malicious people to compromise a user's system 
with a specially crafted .wav file.

2. Davide Del Vecchio discovered a vulnerability mpg123, a popular (but non-free) 
MPEG layer 1/2/3 audio player.  A malicious MPEG layer 2/3 file could cause the header 
checks in mpg123 to fail, which could in turn allow arbitrary code to be executed with 
the privileges of the user running mpg123.





1.



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 565-1                     security@xxxxxxxxxx
http://www.debian.org/security/                             Martin Schulze
October 13th, 2004                      http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : sox
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-0557
Debian Bug     : 262083

Ulf Harnhammar has reported two vulnerabilities in SoX, a universal sound sample translator, 
which may be exploited by malicious people to compromise a user's system with a specially crafted .wav file.

For the stable distribution (woody) these problems have been fixed in version 12.17.3-4woody2.

For the unstable distribution (sid) these problems have been fixed in version 12.17.4-9.

We recommend that you upgrade your sox package.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2.dsc
      Size/MD5 checksum:      591 cb5fec82f02cd32b80faebe304ce520b
    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2.diff.gz
      Size/MD5 checksum:     7416 c3cc69a3e01c562f19ae87e1db396698
    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3.orig.tar.gz
      Size/MD5 checksum:   402599 23b6a2f9f225eebc30d85ec9e1af54a4

  Alpha architecture:

    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_alpha.deb
      Size/MD5 checksum:   336076 678c3efb9398209c0eaa81837c399476
    http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_alpha.deb
      Size/MD5 checksum:   193074 f79000b7567eb00ed31500e0aae44d72

  ARM architecture:

    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_arm.deb
      Size/MD5 checksum:   260592 43e3adc88d20838848bf259eef1e5663
    http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_arm.deb
      Size/MD5 checksum:   151582 eec28d453add90289b07c85114077131

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_i386.deb
      Size/MD5 checksum:   241232 0cbd8714254f8e3383addbf3d1f21cfa
    http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_i386.deb
      Size/MD5 checksum:   136726 369d2b13579121a95fbe30a32aee7b05

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_ia64.deb
      Size/MD5 checksum:   400464 4e7c9d20cd13130e042724943f77671a
    http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_ia64.deb
      Size/MD5 checksum:   218374 332c9f352a2e338a23fb10d29844b3f0

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_hppa.deb
      Size/MD5 checksum:   305896 d4b2682a2394366c1c483442c81841d9
    http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_hppa.deb
      Size/MD5 checksum:   180884 bc5af7ce55b676059bba44321cfaf0e1

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_m68k.deb
      Size/MD5 checksum:   220024 46f468987f21d4a6c68f52e7c84c86ff
    http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_m68k.deb
      Size/MD5 checksum:   127202 be81e1633da5ee7820446c07e2ee614e

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_mips.deb
      Size/MD5 checksum:   291090 6a7727dc32a9b26e13a887e88ff09394
    http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_mips.deb
      Size/MD5 checksum:   167998 af42bc50dc7bc7bc5fbdbc00e03fd630

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_mipsel.deb
      Size/MD5 checksum:   290876 0e0a0cbf78f40bd6dd97593bdf4b1871
    http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_mipsel.deb
      Size/MD5 checksum:   168254 79ff397a577a8e1c5eb51d88f51d00d3

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_powerpc.deb
      Size/MD5 checksum:   269022 fc13fb341a3dcf15492d07be291dcb38
    http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_powerpc.deb
      Size/MD5 checksum:   166164 46508fb11779d0fa9467b1c70687c054

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_s390.deb
      Size/MD5 checksum:   254254 c549fb32a18e22aba4361f22c645a66c
    http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_s390.deb
      Size/MD5 checksum:   140188 4f632838362fdbdb5762e311c37edfc5

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/s/sox/sox_12.17.3-4woody2_sparc.deb
      Size/MD5 checksum:   261678 dfe2049b353134fd6f817fe5dba6670d
    http://security.debian.org/pool/updates/main/s/sox/sox-dev_12.17.3-4woody2_sparc.deb
      Size/MD5 checksum:   153940 6eb8611b2ef1e7f70d5992af4f3ab687


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: 
ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: 
debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBbS7rW5ql+IAeqTIRAmoLAJ0RCtf3Rs7ENWaTk7ht4ACreTolBQCeIdyb
2UJd1pud7oDRU4u+Z/wvX00=
=XhLw
- -----END PGP SIGNATURE-----



2.



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 564-1                     security@xxxxxxxxxx
http://www.debian.org/security/                             Martin Schulze
October 13th, 2004                      http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : mpg123
Vulnerability  : missing user input sanitising
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-0805
License        : non-free

Davide Del Vecchio discovered a vulnerability mpg123, a popular (but
non-free) MPEG layer 1/2/3 audio player.  A malicious MPEG layer 2/3 file could cause the 
header checks in mpg123 to fail, which could in turn allow arbitrary code to be executed 
with the privileges of the user running mpg123.

For the stable distribution (woody) this problem has been fixed in version 0.59r-13woody3.

For the unstable distribution (sid) this problem has been fixed in version 0.59r-16.

We recommend that you upgrade your mpg123 package.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3.dsc
      Size/MD5 checksum:      748 77cb64c82c3c07b3c418b4cdb3c7a54e
    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3.diff.gz
      Size/MD5 checksum:    24192 aae8ca014d465adf9e714e5faef260d0
    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r.orig.tar.gz
      Size/MD5 checksum:   159028 95df59ad1651dd2346d49fafc83747e7

  Alpha architecture:

    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_alpha.deb
      Size/MD5 checksum:    94482 9ad504920153d01a12d4c7c46e22e73f
    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-esd_0.59r-13woody3_alpha.deb
      Size/MD5 checksum:    94472 2c10a1a915a181c03c814e47785aa695

  ARM architecture:

    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_arm.deb
      Size/MD5 checksum:    89640 90f1770883e8ead46b951325648ef4be

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_i386.deb
      Size/MD5 checksum:    81516 bc22febb3dd0bc2967cd850b2827838c
    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-esd_0.59r-13woody3_i386.deb
      Size/MD5 checksum:    81468 4adec8c74c7132a38a1c304ea8ca66d2
    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-nas_0.59r-13woody3_i386.deb
      Size/MD5 checksum:    83502 72463077c7c4238f7ed6e5e1ac5eaeaa
    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-oss-3dnow_0.59r-13woody3_i386.deb
      Size/MD5 checksum:    81186 b4bc8699d4f58657033e0f79c87c652a
    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-oss-i486_0.59r-13woody3_i386.deb
      Size/MD5 checksum:    87740 67f686c50d87051ebacc8a5840f11ca2

  HP Precision architecture:

    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_hppa.deb
      Size/MD5 checksum:    97336 5c32e4be18d105d6af3ce2f199d27419

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_m68k.deb
      Size/MD5 checksum:    75894 a65575a7b5bdf578b13d585036d8276a

  PowerPC architecture:

    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_powerpc.deb
      Size/MD5 checksum:    88480 4e5d970a0a42cf9a9dd33b6590d33beb
    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-esd_0.59r-13woody3_powerpc.deb
      Size/MD5 checksum:    88406 7289b77111d94d2ed2362739939dd9eb

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_sparc.deb
      Size/MD5 checksum:    88650 9549821e52d23b808acd2702ba139ae0


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: 
ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: 
debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBbSbxW5ql+IAeqTIRAsL+AJ98kPs9PAPNl6Q56pOo1NQYTkM1kwCfaa41
kuIY7LAJhBZ7i6huy6M+SlY=
=8mF+
- -----END PGP SIGNATURE-----



- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 870 487 0748 Ext 4511
Fax: +44 (0) 870 487 0749

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 870 487 0748 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Debian for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBQW6DWIpao72zK539AQF4MgQAnc1Wgj62JaRaTK8lkGyZ3zbPveJ34Wal
26EU41b62iWHIKCbzrJw1Y/3I96eoenSGlPvP6cgsoBGN3QWumE7cHW0cjm7DlrD
N6o5YYa6TsT2XoIzwLi/X77qZFQcy96Ojyc48H1cQz1WCMjPmtukJ/ET3Mx4bMrg
sI+1ASXgysQ=
=3rDz
-----END PGP SIGNATURE-----