Debian Security Advisory DSA 487-1                     security@debian.org 
Debian -- Security Information                              Matt Zimmerman
April 16th, 2004                          Debian -- Debian security FAQ 
- --------------------------------------------------------------------------

Package        : neon
Vulnerability  : format string
Problem-Type   : remote
Debian-specific: no
CVE Ids        : CAN-2004-0179

Multiple format string vulnerabilities were discovered in neon, an
HTTP and WebDAV client library.  These vulnerabilities could
potentially be exploited by a malicious WebDAV server to execute
arbitrary code with the privileges of the process using libneon.

For the current stable distribution (woody) these problems have been
fixed in version 0.19.3-2woody3.

For the unstable distribution (sid), these problems have been fixed in
version 0.24.5-1.

We recommend that you update your neon package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

      
      Size/MD5 checksum:      582 4753d19632b3ba69e7d97f61b21da8b1
      
      Size/MD5 checksum:     4081 6ed8f310baae56db47a34f3affdf0dd5
      
      Size/MD5 checksum:   499574 9dbb8c276e5fc58a707b6e908abdce63

  Alpha architecture:

      
      Size/MD5 checksum:   122054 f8455a4aca0ad0eed97b8635f7552ecc
      
      Size/MD5 checksum:    77894 12283440f135e0b68b328151c78d5240

  ARM architecture:

      
      Size/MD5 checksum:   100820 6ac65c11b484429f9f388ae0bab9136c
      
      Size/MD5 checksum:    70256 d16830700754df93ec06fcc72d952be6

  Intel IA-32 architecture:

      
      Size/MD5 checksum:    94820 7a7f0c168b101390a619ffde40f9efc3
      
      Size/MD5 checksum:    65780 b72a10b0dbcbfb149b36b3053627a9d2

  Intel IA-64 architecture:

      
      Size/MD5 checksum:   131246 dda199f3b1d6598bb8aa2f6ba37521d4
      
      Size/MD5 checksum:    96250 043f6b4d3eb394bcaa2b7dda6a78b676

  HP Precision architecture:

      
      Size/MD5 checksum:   118574 d7904398181654ebc8eab408a2d96cec
      
      Size/MD5 checksum:    80776 fdb1f1e337ee50318cbccfeeda0ec32f

  Motorola 680x0 architecture:

      
      Size/MD5 checksum:    93110 7993e9e642cbefb27ea6a7085615bb55
      
      Size/MD5 checksum:    67668 fc37364b5b44454a637b69b591ce8c04

  Big endian MIPS architecture:

      
      Size/MD5 checksum:   110704 3fbe497c5ac44aee13457fcfe9b785cf
      
      Size/MD5 checksum:    68644 29c7188a9dfe0da26a218eea6714997b

  Little endian MIPS architecture:

      
      Size/MD5 checksum:   110502 73eb5e6338f9ce6f5fd0c0cd27cbac48
      
      Size/MD5 checksum:    68626 f85bcdab3e2957d53f00569966eaa3b6

  PowerPC architecture:

      
      Size/MD5 checksum:   107168 c1994dba85b7e2150b1419fd4da44a14
      
      Size/MD5 checksum:    71544 5e1812c5242835b7567d3549a334d9d8

  IBM S/390 architecture:

      
      Size/MD5 checksum:    96930 022ad2200a279efc9ab1482e599b47d3
      
      Size/MD5 checksum:    70958 632017c6cd495f5a35a3ced63f2bab88

  Sun Sparc architecture:

      
      Size/MD5 checksum:   102406 d3e5c72b6de6f90f2272c62d4ee3c88c
      
      Size/MD5 checksum:    70812 c36ba230074c19cb6a58b76da986767d

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb  Debian -- Security Information  stable/updates main
For dpkg-ftp:    dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and  http://packages.debian.org/

Debian: neon Format string vulnerability

April 17, 2004
These vulnerabilities could exploited by a malicious WebDAV server to execute arbitrary code with libneon's privileges.

Summary

Multiple format string vulnerabilities were discovered in neon, an
HTTP and WebDAV client library. These vulnerabilities could
potentially be exploited by a malicious WebDAV server to execute
arbitrary code with the privileges of the process using libneon.

For the current stable distribution (woody) these problems have been
fixed in version 0.19.3-2woody3.

For the unstable distribution (sid), these problems have been fixed in
version 0.24.5-1.

We recommend that you update your neon package.

Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody

Source archives:


Size/MD5 checksum: 582 4753d19632b3ba69e7d97f61b21da8b1

Size/MD5 checksum: 4081 6ed8f310baae56db47a34f3affdf0dd5

Size/MD5 checksum: 499574 9dbb8c276e5fc58a707b6e908abdce63

Alpha architecture:


Size/MD5 checksum: 122054 f8455a4aca0ad0eed97b8635f7552ecc

Size/MD5 checksum: 77894 12283440f135e0b68b328151c78d5240

ARM architecture:


Size/MD5 checksum: 100820 6ac65c11b484429f9f388ae0bab9136c

Size/MD5 checksum: 70256 d16830700754df93ec06fcc72d952be6

Intel IA-32 architecture:


Size/MD5 checksum: 94820 7a7f0c168b101390a619ffde40f9efc3

Size/MD5 checksum: 65780 b72a10b0dbcbfb149b36b3053627a9d2

Intel IA-64 architecture:


Size/MD5 checksum: 131246 dda199f3b1d6598bb8aa2f6ba37521d4

Size/MD5 checksum: 96250 043f6b4d3eb394bcaa2b7dda6a78b676

HP Precision architecture:


Size/MD5 checksum: 118574 d7904398181654ebc8eab408a2d96cec

Size/MD5 checksum: 80776 fdb1f1e337ee50318cbccfeeda0ec32f

Motorola 680x0 architecture:


Size/MD5 checksum: 93110 7993e9e642cbefb27ea6a7085615bb55

Size/MD5 checksum: 67668 fc37364b5b44454a637b69b591ce8c04

Big endian MIPS architecture:


Size/MD5 checksum: 110704 3fbe497c5ac44aee13457fcfe9b785cf

Size/MD5 checksum: 68644 29c7188a9dfe0da26a218eea6714997b

Little endian MIPS architecture:


Size/MD5 checksum: 110502 73eb5e6338f9ce6f5fd0c0cd27cbac48

Size/MD5 checksum: 68626 f85bcdab3e2957d53f00569966eaa3b6

PowerPC architecture:


Size/MD5 checksum: 107168 c1994dba85b7e2150b1419fd4da44a14

Size/MD5 checksum: 71544 5e1812c5242835b7567d3549a334d9d8

IBM S/390 architecture:


Size/MD5 checksum: 96930 022ad2200a279efc9ab1482e599b47d3

Size/MD5 checksum: 70958 632017c6cd495f5a35a3ced63f2bab88

Sun Sparc architecture:


Size/MD5 checksum: 102406 d3e5c72b6de6f90f2272c62d4ee3c88c

Size/MD5 checksum: 70812 c36ba230074c19cb6a58b76da986767d

These files will probably be moved into the stable distribution on
its next revision.

For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/



Severity
Package : neon
Vulnerability : format string
Problem-Type : remote
Debian-specific: no
CVE Ids : CAN-2004-0179

Related News