[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 259/06 - Two Debian Security Advisories: DSA 1000-2 - DSA 1022-1



-----BEGIN PGP SIGNED MESSAGE-----

- -----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 259/06 dated 04.04.06  Time: 14:00  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ----------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- -----------------------------------------------------------------------------------

Title
=====
Two Debian Security Advisories: DSA 1000-2 - DSA 1022-1

Detail
====== 
DSA 1000-2 - New Apache2::Request packages fix denial of service
DSA 1022-1 - New storebackup packages fix several vulnerabilities

1.

- ------BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------------
Debian Security Advisory DSA 1000-2                    security@xxxxxxxxxx
http://www.debian.org/security/                             Martin Schulze
April 3rd, 2006                         http://www.debian.org/security/faq
- ----------------------------------------------------------------------------

Package        : libapreq2-perl
Vulnerability  : design error
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2006-0042
BugTraq ID     : 16710
Debian Bug     : 354060 358689

Gunnar Wolf noticed that the correction for the following problem was
not complete and requires an update.  For completeness we're
providing the original problem description:

   An algorithm weakness has been discovered in Apache2::Request, the
   generic request library for Apache2 which can be exploited remotely
   and cause a denial of service via CPU consumption.

The old stable distribution (woody) does not contain this package.

For the stable distribution (sarge) this problem has been fixed in
version 2.04-dev-1sarge2.

For the unstable distribution (sid) this problem has been fixed in
version 2.07-1.

We recommend that you upgrade your libapreq2, libapache2-mod-apreq2
and libapache2-request-perl packages.


Upgrade Instructions
- ----------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- ----------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapreq2-perl_2.04-dev-1sarge2.dsc
      Size/MD5 checksum:      840 d921e859c2f3fcaee6ff743e3be04f14
    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapreq2-perl_2.04-dev-1sarge2.diff.gz
      Size/MD5 checksum:    21397 ca778b4a0db433123c90eed21f9db6ec
    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapreq2-perl_2.04-dev.orig.tar.gz
      Size/MD5 checksum:   592748 1f5dd762c877b716f3774d502f575196

  Alpha architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge2_alpha.deb
      Size/MD5 checksum:   237982 a41165a7dedd6214d2be3336010c2c81

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge2_amd64.deb
      Size/MD5 checksum:   219068 f3c7668fad70feee6f1a45bbe86918ec

  ARM architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge2_arm.deb
      Size/MD5 checksum:   214954 9bdf3e1f3c88b7ae62789181e6b765ad

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge2_i386.deb
      Size/MD5 checksum:   215940 5af4bba9feece136ac1d14b7cac75036

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge2_ia64.deb
      Size/MD5 checksum:   259660 2af6ef8ce8eed5af6685020345c9b733

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge2_hppa.deb
      Size/MD5 checksum:   234884 3cfef4e73e4e2142800aaec7284b809a

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge2_m68k.deb
      Size/MD5 checksum:   205078 f94764785df55aec13426bed78b40a21

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge2_mips.deb
      Size/MD5 checksum:   215416 3f103828272d4dd87a011939a6bbca14

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge2_mipsel.deb
      Size/MD5 checksum:   215652 304e2cdc70aed7005ff89495e23e3ad9

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge2_powerpc.deb
      Size/MD5 checksum:   227406 fc01e8ac8b2ec606d6fd0da416d6872f

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge2_s390.deb
      Size/MD5 checksum:   220860 896222b3361c62b5f216dec66516fca1

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/liba/libapreq2-perl/libapache2-request-perl_2.04-dev-1sarge2_sparc.deb
      Size/MD5 checksum:   215140 4bc8e83c1a331859fe757e8f3581612c


  These files will probably be moved into the stable distribution on
  its next update.

- -----------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

- - -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEMM6lW5ql+IAeqTIRAjnYAJ9HJnXpTTO6ljoxS9c+Nd8whNCXKACdE4S6
DZHxKviBB/ZK5IaoIRqCeUk=
=16DI
- ------END PGP SIGNATURE-----


2.


- ------BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------------
Debian Security Advisory DSA 1022-1                    security@xxxxxxxxxx
http://www.debian.org/security/                         Moritz Muehlenhoff
April 4th, 2006                         http://www.debian.org/security/faq
- ----------------------------------------------------------------------------

Package        : storebackup
Vulnerability  : several
Problem-Type   : local
Debian-specific: no
CVE ID         : CVE-2005-3146 CVE-2005-3147 CVE-2005-3148 
Debian Bug     : 332434

Several vulnerabilities have been discovered in the backup utility 
storebackup. The Common Vulnerabilities and Exposures project identifies
the following problems:

CVE-2005-3146

    Storebackup creates a temporary file predictably, which can be
    exploited to overwrite arbitrary files on the system with a symlink
    attack.

CVE-2005-3147

    The backup root directory is created with world-readable permissions,
    which may leak sensitive data.

CVE-2005-3148

    The user and group rights of symlinks are set incorrectly when making
    or restoring a backup, which may leak sensitive data.

The old stable distribution (woody) doesn't contain storebackup packages.

For the stable distribution (sarge) these problems have been fixed in
version 1.18.4-2sarge1.

For the unstable distribution (sid) these problems have been fixed in
version 1.19-2.

We recommend that you upgrade your storebackup package.


Upgrade Instructions
- ----------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- ----------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/s/storebackup/storebackup_1.18.4-2sarge1.dsc
      Size/MD5 checksum:      598 94af97325a97695b0b64fd8df238b758
    http://security.debian.org/pool/updates/main/s/storebackup/storebackup_1.18.4-2sarge1.diff.gz
      Size/MD5 checksum:     5963 b85a68d72314a983f898f405afa1ca95
    http://security.debian.org/pool/updates/main/s/storebackup/storebackup_1.18.4.orig.tar.gz
      Size/MD5 checksum:   120135 8ae9e30dfa5918ee420dc6e6ac2e184c

  Architecture independent components:

    http://security.debian.org/pool/updates/main/s/storebackup/storebackup_1.18.4-2sarge1_all.deb
      Size/MD5 checksum:   120128 1b558238c057ed58032d16f8c51f4d52


  These files will probably be moved into the stable distribution on
  its next update.

- -----------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- ------BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEMbEyXm3vHE4uyloRAspxAKClx3g+Gb0mbV88ycCjPCpcKBtN7ACgy4V/
Dr0v4jDgOaUu3fzJjrqNoco=
=kDbx
- ------END PGP SIGNATURE-----

- -----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 870 487 0748 Ext 4511
Fax: +44 (0) 870 487 0749

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 870 487 0748 and follow the prompts

- -----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Debian for the information 
contained in this Briefing. 
- -----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the site of the
original source to ensure that you receive the most current information concerning 
that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- -----------------------------------------------------------------------------------
<End of UNIRAS Briefing>

- -----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQCVAwUBRDJuFYpao72zK539AQF5+gP+N04QFNnpq+/YztX8Zbtf1iZyLbHM5VvO
tA/jHN9LvFspZoA+l0krmltKLD6/ulePHO/VdHpT2M6DraYZDgotdoSpMvQ+J2Lo
No3/LcsFMdnc4qRUstaoKkPJ33Y8QXb6z3ir0ovPCfDLCE4H5Ne+doj9PCU3DVWS
KWrBXnX8yjg=
=3hvY
- -----END PGP SIGNATURE-----

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQCVAwUBRDJudYpao72zK539AQFLdAP+LddowVySgW4dmcaWYGjHGaIYg+PpUd4x
IEdkk2pzpP9hh/Mv3B9oU8m002fc6dWge/0K6TnqvvosSJ+WscArq+RFs6HyMLEP
ebEfcHaAVvvzQtnXlwXpRRs3FAlpFVWcov4YVuSw1lAPcaaKNiHJuU7+omE40+Hb
cGoDByUHgMc=
=bpbF
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________