Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 23rd, 2015
Linux Advisory Watch: March 20th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: exim arbitrary code execution fix Print E-mail
User Rating:      How can I rate this item?
Posted by Joe Shakespeare   
Debian Philip Hazel announced a buffer overflow in the host_aton function in exim, the default mail-tranport-agent in Debian, which can lead to the execution of arbitrary code via an illegal IPv6 address.

- --------------------------------------------------------------------------
Debian Security Advisory DSA 635-1                                        Martin Schulze
January 12th, 2005            
- --------------------------------------------------------------------------

Package        : exim
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-0021
Debian Bug     : 289046

Philip Hazel announced a buffer overflow in the host_aton function in
exim, the default mail-tranport-agent in Debian, which can lead to the
execution of arbitrary code via an illegal IPv6 address.

For the stable distribution (woody) this problem has been fixed in
version 3.35-1woody4.

For the unstable distribution (sid) this problem has been fixed in
version 3.36-13 of exim and 4.34-10 of exim4.

We recommend that you upgrade your exim and exim4 packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:
      Size/MD5 checksum:      661 d97ecab579bd3dbaa3e9be00b8b16d85
      Size/MD5 checksum:    80195 a02abeefa9d1145ae623ad661aab5f5a
      Size/MD5 checksum:  1271057 42d362e40a21bd7ffc298f92c8bd986a

  Alpha architecture:
      Size/MD5 checksum:   872796 a46f5dc95d777366cb492eb57ec8dd9f
      Size/MD5 checksum:    52318 bf93e35aec9f401d8413015c50f5cbae

  ARM architecture:
      Size/MD5 checksum:   785980 5ced90e4c4ecd1ca6a60980634b309e8
      Size/MD5 checksum:    43514 07b7324395ff66f68db354c6b4589db7

  Intel IA-32 architecture:
      Size/MD5 checksum:   759270 9001a456b0a34f4bf5de88d901c70a97
      Size/MD5 checksum:    39210 78e5eecee7101a355ddabec9d0f07b98

  Intel IA-64 architecture:
      Size/MD5 checksum:   972852 43f4fc30483d8ad5c42e031fd64a9e8d
      Size/MD5 checksum:    65166 cdc921d9be2ec60b5f0ed95a5b976732

  HP Precision architecture:
      Size/MD5 checksum:   815358 c506baffb4404f32762468fbc494551c
      Size/MD5 checksum:    48294 d90efe5be79e966e07a7cbe8e9013939

  Motorola 680x0 architecture:
      Size/MD5 checksum:   737856 aefe6b63ebd03e9fe449afe22e752547
      Size/MD5 checksum:    37752 e0d2b938e50c3b408928b8150459ad2b

  Big endian MIPS architecture:
      Size/MD5 checksum:   824458 0c1db679287a6de37f2c320f335c650c
      Size/MD5 checksum:    48882 1670c36409482a8a870becf826f7ae68

  Little endian MIPS architecture:
      Size/MD5 checksum:   824846 88564f1d1b0c1781587d5db1bccdde77
      Size/MD5 checksum:    48778 6a7002c766a84dd81eed39d23f8709d5

  PowerPC architecture:
      Size/MD5 checksum:   794244 abfa2009cd6417101d120a5980641012
      Size/MD5 checksum:    44794 ea626fcb485a423fb56e61a1c4ae67e9

  IBM S/390 architecture:
      Size/MD5 checksum:   780026 bc9a3b5488cd7ee72c290f86f601beec
      Size/MD5 checksum:    43930 f50688c682bcaeabfbd47c9e46a06143

  Sun Sparc architecture:
      Size/MD5 checksum:   785298 1841407d21f544cf2645e373a6caad15
      Size/MD5 checksum:    42444 632b5aadc5c930c7c3e956fef10d5ffe

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Tech Companies, Privacy Advocates Call for NSA Reform
Google warns of unauthorized TLS certificates trusted by almost all OSes
How Kevin Mitnick hacked the audience at CeBIT 2015
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.