---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: Debian update for newsx SECUNIA ADVISORY ID: SA31307 VERIFY ADVISORY: http://secunia.com/advisories/31307/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for newsx. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the "read_article()" function in src/getarticle.c. This can be exploited to cause a stack-based buffer overflow via a specially crafted NNTP packet. SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1.dsc Size/MD5 checksum: 601 a96fab9796a6947419d0fa8b116117d1 http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6.orig.tar.gz Size/MD5 checksum: 302553 45d7b7655c7e30c22321f41d701bb6f4 http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1.diff.gz Size/MD5 checksum: 105510 6d0b8e91489284a99d7e3d1d1a18438a alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1_alpha.deb Size/MD5 checksum: 179232 a1e5978150fdc4e85ae5429df50dce14 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1_amd64.deb Size/MD5 checksum: 159000 36120414520dabbe24a603535483d627 arm architecture (ARM) http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1_arm.deb Size/MD5 checksum: 148522 f86262e52e3cfe57f9149cd7d03b9792 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1_hppa.deb Size/MD5 checksum: 166048 3664074d8015308faacfdc24813cbe2e i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1_i386.deb Size/MD5 checksum: 149314 0d0223be6ec9375b11a29271e14f0ba0 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1_ia64.deb Size/MD5 checksum: 229656 d9525b17ed531e7f94bf795016559ab0 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1_mips.deb Size/MD5 checksum: 169628 9902b13a40be1f8839ea6553bebda796 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1_mipsel.deb Size/MD5 checksum: 169130 082f47df05acf04de8a1590acad38124 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1_powerpc.deb Size/MD5 checksum: 158742 f172b7b889f111cc2090082878f80816 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1_s390.deb Size/MD5 checksum: 161132 8e5ca0412a29bd03dfbdf1dd8e88df30 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/n/newsx/newsx_1.6-2etch1_sparc.deb Size/MD5 checksum: 147978 511f9a433c89f3fe114ebe04158d65ab -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.6-3. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/2008/msg00207.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------