drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in firebird2.5
Name: |
Denial of Service in firebird2.5 |
|
ID: |
DSA-3109-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian wheezy |
|
Datum: |
So, 21. Dezember 2014, 20:56 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9323 |
|
Applikationen: |
Firebird |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3109-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso December 21, 2014 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : firebird2.5 CVE ID : CVE-2014-9323 Debian Bug : 772880
Dmitry Kovalenko discovered that the Firebird database server is prone to a denial of service vulnerability. An unauthenticated remote attacker could send a malformed network packet to a firebird server, which would cause the server to crash.
For the stable distribution (wheezy), this problem has been fixed in version 2.5.2.26540.ds4-1~deb7u2.
For the upcoming stable distribution (jessie), this problem has been fixed in version 2.5.3.26778.ds4-5.
For the unstable distribution (sid), this problem has been fixed in version 2.5.3.26778.ds4-5.
We recommend that you upgrade your firebird2.5 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJUlqQDAAoJEAVMuPMTQ89ESIkP+gMDllaZMkCZQ5SNeZJiaDo+ u9fLTXjoGC+aIL+uElbIUA9PPz109K/7dQCIuizDjl/GwHuXHE8l2iLjXrvDOZdT ZmupG4AVK6vTW5/byEaYdNHTiMXts7sp//urWPpj7pYdwJFUFFDC5sCLmYu1PIxU QCL+dwUlpa13zJJxdHzp4DyJatee8x6HAJnIliQWE1ouV8XTLaemJ3WsJu9AF6Zk ZA7Z9jZ9TogyqeEs5e1IppZFMshwb760SNyy2y0XqOUfVYCu8O7PAiqrenZ+M56l AygMBBOQKS8WtcHVqzfX/E+L4Qc79lVcq5MUq0C1pb5bnI1xB7LB8nrKdSXfoh4B Ce64adaQkrZoDc/lpOxWkbLU6HO/Ilibyhm7UmexFjR3nPx9zTebgsmLuUwoVMtH VHHRNrG2hwueups4iIsFHwMyWHqh5e04lKfSb8/z17RlE0UYwv0xN8X0IPz8+ROe hP7l49EHoFnmo8tjmXVweOPnTbgw5U+zEu+AMExCrb5DNPqSzmJdTN7M4NhuaKrO dn+0ChyAvSiKKb62z4NXNvXGhVPx2tp9RP8BfFJcbsoRUJw+CrIuEssqyAc+z1sA XbJi2AAP8MOWRcOj2EaImGpRNUTmSMKvLphLpYljiv64jfgh9q02ALlWLEMJrCEF hkmvu3Saj56u/QpsR3Pn =I/I/ -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: https://lists.debian.org/E1Y2e25-0001sQ-4P@master.debian.org
|
|
|
|