drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in Elinks
Name: |
Zwei Probleme in Elinks |
|
ID: |
USN-851-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 6.06 |
|
Datum: |
Mi, 21. Oktober 2009, 22:48 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7224 |
|
Applikationen: |
ELinks |
|
Originalnachricht |
--===============3287819732753779299== Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="hHWLQfXTYDoKhP50" Content-Disposition: inline
--hHWLQfXTYDoKhP50 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
=========================================================== Ubuntu Security Notice USN-851-1 October 21, 2009 elinks vulnerabilities CVE-2006-5925, CVE-2008-7224 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: elinks 0.10.6-1ubuntu3.4 elinks-lite 0.10.6-1ubuntu3.4
After a standard system upgrade you need to restart Elinks to effect the necessary changes.
Details follow:
Teemu Salmela discovered that Elinks did not properly validate input when processing smb:// URLs. If a user were tricked into viewing a malicious website and had smbclient installed, a remote attacker could execute arbitrary code with the privileges of the user invoking the program. (CVE-2006-5925)
Jakub Wilk discovered a logic error in Elinks, leading to a buffer overflow. If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2008-7224)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
elinks_0.10.6-1ubuntu3.4.diff.gz Size/MD5: 32513 2337a42ab88b259360509ca287a7fdb4 elinks_0.10.6-1ubuntu3.4.dsc Size/MD5: 746 35c7278a815709ad6049c98eff1e21f9 elinks_0.10.6.orig.tar.gz Size/MD5: 3651428 0243203b9e54cf0cf002fca31244ce79
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
elinks_0.10.6-1ubuntu3.4_amd64.deb Size/MD5: 907150 31ade5835f45e514e0c0b1a7dd86cc17 elinks-lite_0.10.6-1ubuntu3.4_amd64.deb Size/MD5: 732642 b8581260f7a96f74a4658367c4589948
i386 architecture (x86 compatible Intel/AMD):
elinks_0.10.6-1ubuntu3.4_i386.deb Size/MD5: 845652 030f2fa6d5e6345322ff9e721a8e6150 elinks-lite_0.10.6-1ubuntu3.4_i386.deb Size/MD5: 683282 433e35cea4c997bab0363c0bdb1b327b
powerpc architecture (Apple Macintosh G3/G4/G5):
elinks_0.10.6-1ubuntu3.4_powerpc.deb Size/MD5: 890200 16446dc0b839fc78d335df36fe7515bb elinks-lite_0.10.6-1ubuntu3.4_powerpc.deb Size/MD5: 721242 4e90bc3c72980c0337f5c05a8eb62d69
sparc architecture (Sun SPARC/UltraSPARC):
elinks_0.10.6-1ubuntu3.4_sparc.deb Size/MD5: 862772 740ae50cb4c3d0f3ca5ee4c8cf94861d elinks-lite_0.10.6-1ubuntu3.4_sparc.deb Size/MD5: 697860 eb467ca12766aed2c5e7c1da96a3ccff
--hHWLQfXTYDoKhP50 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkrfY5sACgkQW0JvuRdL8Bqf9QCeMDzfPoFwEjDXVDC5tz70d8CM zUoAoIc3k319GohOUhDyTHPiwk7Jktz4 =v51q -----END PGP SIGNATURE-----
--hHWLQfXTYDoKhP50--
--===============3287819732753779299== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============3287819732753779299==--
|
|
|
|