Date: 04 January 2008
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2008.0005 -- [UNIX/Linux][Debian]
New tcpreen packages fix denial of service
4 January 2008
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: tcpreen
Publisher: Debian
Operating System: Debian GNU/Linux 4.0
UNIX variants (UNIX, Linux, OSX)
Impact: Denial of Service
Access: Remote/Unauthenticated
CVE Names: CVE-2007-6562
Original Bulletin: http://www.debian.org/security/2008/dsa-1443
Comment: This advisory references vulnerabilities in products which run on
platforms other than Debian. It is recommended that administrators
running tcpreen check for an updated version of the software for
their operating system.
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1443-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
January 03, 2008 http://www.debian.org/security/faq
- - ------------------------------------------------------------------------
Package : tcpreen
Vulnerability : buffer overflows
Problem type : remote
Debian-specific: no
CVE Id(s) : CVE-2007-6562
It was discovered that several buffer overflows in tcpreen, a tool for
monitoring a TCP connection may lead to denial of service.
For the stable distribution (etch), this problem has been fixed in
version 1.4.3-0.1etch1.
The old stable distribution (sarge) doesn't contain tcpreen.
For the unstable distribution (sid), this problem has been fixed in
version 1.4.3-0.3.
We recommend that you upgrade your tcpreen package.
Upgrade instructions
- - --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian 4.0 (stable)
- - -------------------
Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1.dsc
Size/MD5 checksum: 579 83c33a7131f3191048aba4b610e292ca
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3.orig.tar.gz
Size/MD5 checksum: 232290 5600968d012f8353e4e0797d4c330393
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1.diff.gz
Size/MD5 checksum: 26016 b1af9b7571c037713b123f33e5e79721
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_alpha.deb
Size/MD5 checksum: 44064 5dc26f1233f232305b7c8d2e2e2cb4ac
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_amd64.deb
Size/MD5 checksum: 42494 5cc27918abcac4a19eb661894005e963
arm architecture (ARM)
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_arm.deb
Size/MD5 checksum: 39378 10c0d8bd70154755e372318e39f10266
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_hppa.deb
Size/MD5 checksum: 43848 7039041a01ddcd25e74cfb6c025d3e6c
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_i386.deb
Size/MD5 checksum: 40274 bcd58bac3ae59767861a9fee6653e882
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_ia64.deb
Size/MD5 checksum: 48438 85ac614d61faa5a66d7e14efd5490daf
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_mips.deb
Size/MD5 checksum: 43610 9fb5942fc0d95e87c2a8e3964c30b8d7
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_mipsel.deb
Size/MD5 checksum: 43620 e9b81ad8b5e0f05501c264b5efd6ed7f
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_powerpc.deb
Size/MD5 checksum: 40848 43b0d65c0a8445d7d5880f87a5fbb005
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_s390.deb
Size/MD5 checksum: 41020 e4d80551b7ffe958f9ad7103b2973087
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/t/tcpreen/tcpreen_1.4.3-0.1etch1_sparc.deb
Size/MD5 checksum: 39366 e897ed3d4b1d0b85225f88f8a0cc0990
These files will probably be moved into the stable distribution on
its next update.
- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHfS47Xm3vHE4uyloRAvk0AKDjGYiuFnPPlk1wqJFygd0Pb5UPswCggBI4
00sr9i2KsziaShJjvQNPvGs=
=rqc7
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBR315Myh9+71yA2DNAQKjtQP+NPq4WOF49ijjHx/q4LkT23dzAobeul6H
MdXWljPwSIG7d7Nq3dM6GSZX6Vmj9b1TfOYjG0ykFRUyhyRFZYI/JUBMX4aJOid3
YZBDnY72hFjR9AsQ85awy+/815iq98Y+ndchrRiTw/T9ALfbZQh2lmuYmW2fVNLJ
rlPReLdVcy4=
=JY2f
-----END PGP SIGNATURE-----
|