Login
Newsletter
Werbung

Sicherheit: Pufferüberläufe in centerim
Aktuelle Meldungen Distributionen
Name: Pufferüberläufe in centerim
ID: DTSA-55-1
Distribution: Debian Testing
Plattformen: Debian testing
Datum: Sa, 1. September 2007, 06:37
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3713
Applikationen: Centerim

Originalnachricht

--===============0019564293954161746==
Content-Type: multipart/signed;
boundary="nextPart2675018.zZIl9j4hef";
protocol="application/pgp-signature";
micalg=pgp-sha1
Content-Transfer-Encoding: 7bit

--nextPart2675018.zZIl9j4hef
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

=2D -----------------------------------------------------------------------=
=2D--
Debian Testing Security Advisory DTSA-55-1 September 1st , 2=
007
secure-testing-team at lists.alioth.debian.org Steffen Joer=
is
http://secure-testing-master.debian.net/
=2D -----------------------------------------------------------------------=
=2D--

Package : centerim
Vulnerability : buffer overflows
Problem-Scope : remote
Debian-specific: no
CVE ID : CVE-2007-3713

It was discovered that there are multiple buffer overflows, which could lea=
d=20
to the execution of arbitrary code.

=46or the testing distribution (lenny) this is fixed in version
4.22.1-2lenny1

=46or the unstable distribution (sid) this is fixed in version
4.22.1-2.1

This upgrade is recommended if you use centerim
(centerim-common, centerim, centerim-utf8, centerim-fribidi, centericq,=20
centericq-utf8, centericq-fribidi)

Upgrade Instructions
=2D --------------------

To use the Debian testing security archive, add the following lines to
your /etc/apt/sources.list:

deb http://security.debian.org/ testing/updates main contrib non-free
deb-src http://security.debian.org/ testing/updates main contrib non-free

To install the update, run this command as root:

apt-get update && apt-get upgrade

=46or further information about the Debian testing security team, please re=
fer
to http://secure-testing-master.debian.net/

--nextPart2675018.zZIl9j4hef
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQBG2Oyb62zWxYk/rQcRAkphAKC2ZV3SbDedphf1wYYpD3QAdP1FlwCcCvuw
z2EwP7GRStk0V0sHBPkdCcM=
=k3J0
-----END PGP SIGNATURE-----

--nextPart2675018.zZIl9j4hef--


--===============0019564293954161746==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
secure-testing-announce mailing list
secure-testing-announce@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/secure-testing-announce
--===============0019564293954161746==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung