LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 15th, 2014
Linux Advisory Watch: August 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: 'apache-perl' Remote DoS vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
Debian A remote denial of service vulnerability has been fixed in version 1.3.9-14.1-1.21.20000309-1 of the Debianapache-perl package and we recommand that you upgrade your apache-perlpackage immediately.

-------------------------------------------------------------------------
Debian Security Advisory DSA-133-1                    security@debian.org 
http://www.debian.org/security/                         Daniel Jacobowitz
June 20, 2002
-------------------------------------------------------------------------

Package        : apache-perl
Problem type   : remote DoS / exploit
Debian-specific: no
CVE name       : CAN-2002-0392
CERT advisory  : VU#944335

Mark Litchfield found a denial of service attack in the Apache
web-server. While investigating the problem the Apache Software
Foundation discovered that the code for handling invalid requests which
use chunked encoding also might allow arbitrary code execution.

This has been fixed in version 1.3.9-14.1-1.21.20000309-1 of the Debian
apache-perl package and we recommand that you upgrade your apache-perl
package immediately.

An update for the soon to be released Debian GNU/Linux 3.0/woody
distribution will be available soon.

Debian 2.2 (stable)
-------------------

  Stable was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:

     http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1.tar.gz
Size/MD5 checksum:  2400948 c605ca35d8f2966bb9492eed91044bc7
     http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1.dsc
Size/MD5 checksum:      651 443da7020c1c7418ab18dfc1d7e038d0

  alpha architecture (DEC Alpha)

     http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1_alpha.deb
Size/MD5 checksum:  1126006 ba96b07901db27c2cb93955a948b24c4

  arm architecture (Arm)

     http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1_arm.deb
Size/MD5 checksum:   999428 204ca243c6eee9be766ff9321df02738

  i386 architecture (Intel ia32)

     http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1_i386.deb
Size/MD5 checksum:   957686 d382ae4378af7726b4c39eb8127c1323

  m68k architecture (Motorola Mc680x0)

     http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1_m68k.deb
Size/MD5 checksum:   922138 ef96bb1a914baa018c760e4773a64f33

  powerpc architecture (PowerPC)

     http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1_powerpc.deb
Size/MD5 checksum:  1004242 d505c34f337997b328c2fc80cbd3ae48

  sparc architecture (Sun SPARC/UltraSPARC)

     http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1_sparc.deb
Size/MD5 checksum:  1001636 67f46e59bfa545acead0d0fbd0a6aca8

------------------------------------------------------------------------

Obtaining updates:

  By hand:

    wget URL
        will fetch the file for you.
    dpkg -i FILENAME.deb
        will install the fetched file.

  With apt:

    deb  http://security.debian.org/ potato/updates main
        added to /etc/apt/sources.list will give you access to potato updates.
    deb  http://security.debian.org/ woody/updates main
        added to /etc/apt/sources.list will give you access to woody updates.

Mailing list:
    debian-security-announce@lists.debian.org



 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Moving toward smart and secure continuous software delivery
Stealthy, Razor Thin ATM Insert Skimmers
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.