Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ekg
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ekg
ID: USN-162-1
Distribution: Ubuntu
Plattformen: Ubuntu 5.04
Datum: Di, 9. August 2005, 13:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1850
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1851
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1852
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1916
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2369
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2370
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2448
Applikationen: EKG

Originalnachricht

--===============0393218098=	protocol="application/pgp-signature";
boundary="Dxnq1zWXvFF0Q93v"
Content-Disposition: inline


--Dxnq1zWXvFF0Q93v
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

===========================================================
Ubuntu Security Notice USN-162-1 August 08, 2005
ekg vulnerabilities
CAN-2005-1850, CAN-2005-1851, CAN-2005-1852, CAN-2005-1916,
CAN-2005-2369, CAN-2005-2370, CAN-2005-2448
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected:

ekg
libgadu3

The problem can be corrected by upgrading the affected package to
version 1:1.5-4ubuntu1.2. In general, a standard system upgrade is
sufficient to effect the necessary changes. If you use the Instant
Messaging application "Kopete", you need to restart it after the
upgrade since it uses the libgadu3 library package.

Details follow:

Marcin Owsiany and Wojtek Kaniewski discovered that some contributed
scripts (contrib/ekgh, contrib/ekgnv.sh, and contrib/getekg.sh) in the
ekg package created temporary files in an insecure way, which allowed
exploitation of a race condition to create or overwrite files with the
privileges of the user invoking the script. (CAN-2005-1850)

Marcin Owsiany and Wojtek Kaniewski discovered a shell command
injection vulnerability in a contributed utility
(contrib/scripts/ekgbot-pre1.py). By sending specially crafted content
to the bot, an attacker could exploit this to execute arbitrary code
with the privileges of the user running ekgbot. (CAN-2005-1851)

Marcin =C5=9Alusarz discovered an integer overflow in the Gadu library. By
sending a specially crafted incoming message, a remote attacker could
execute arbitrary code with the privileges of the application using
libgadu. (CAN-2005-1852)

Eric Romang discovered that another contributed script
(contrib/scripts/linki.py) created temporary files in an insecure way,
which allowed exploitation of a race condition to create or overwrite
files with the privileges of the user invoking the script.
(CAN-2005-1916)

Grzegorz Ja=C5=9Bkiewicz discovered several integer overflows in the Gadu
library. A remote attacker could exploit this to crash the Gadu client
application or even execute arbitrary code with the privileges of the
user by sending specially crafted messages. (CAN-2005-2369)

Szymon Zygmunt and Micha=C5=82 Bartoszkiewicz discovered a memory alignment
error in the Gadu library. By sending specially crafted messages, a
remote attacker could crash the application using the library.
(CAN-2005-2370)

Marcin =C5=9Alusarz discovered that the Gadu library did not properly
handle endianess conversion in some cases. This caused invalid
behavior on big endian architectures. The only affected supported
architecture is powerpc. (CAN-2005-2448)


Source archives:

ekg_1.5-4ubuntu1.2.diff.gz
Size/MD5: 66554 94d10dc8d262c773b75e273a89af21ca
http://security.ubuntu.com/ubuntu/pool/main/e/ekg/ekg_1.5-4ubuntu1.2.dsc
Size/MD5: 742 2d609b048a3a7a89c245fec78380ce4f
http://security.ubuntu.com/ubuntu/pool/main/e/ekg/ekg_1.5.orig.tar.gz
Size/MD5: 483606 721ebfe7b13e9531b30d558465e6695f

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

ekg_1.5-4ubuntu1.2_amd64.deb
Size/MD5: 271816 c2b9ca69a9fb3a16933e579203bf68d1
libgadu-dev_1.5-4ubuntu1.2_amd64.deb
Size/MD5: 123200 86b3b97242b9158b4df875178f0b44a7
libgadu3_1.5-4ubuntu1.2_amd64.deb
Size/MD5: 60758 cdc991747fe23f371d5a6ab1d0372e41

i386 architecture (x86 compatible Intel/AMD)

ekg_1.5-4ubuntu1.2_i386.deb
Size/MD5: 257060 b4e34e91748683784dd4afd82d1e4f3a
libgadu-dev_1.5-4ubuntu1.2_i386.deb
Size/MD5: 118968 1d862c2b0f6631b06a30ecea3c6059f2
libgadu3_1.5-4ubuntu1.2_i386.deb
Size/MD5: 59244 cd0e3173ca11c6193c3890565efcdf19

powerpc architecture (Apple Macintosh G3/G4/G5)

ekg_1.5-4ubuntu1.2_powerpc.deb
Size/MD5: 272874 eddb8860f495f69c8703ae13021bcda4
libgadu-dev_1.5-4ubuntu1.2_powerpc.deb
Size/MD5: 125292 52117bda28de8afecd190a11430f0fdc
libgadu3_1.5-4ubuntu1.2_powerpc.deb
Size/MD5: 61946 96965240cde5f35d1561adcc13366636

--Dxnq1zWXvFF0Q93v
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC99MdDecnbV4Fd/IRAo4yAJ9WdcdNUhlfi+OUqIQC6aWJpnv07QCg5/Vy
VOqOOklA+c/UFxuK7emkm/8=
=VZB0
-----END PGP SIGNATURE-----

--Dxnq1zWXvFF0Q93v--


--===============0393218098=MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
http://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce



--===============0393218098==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung