Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: New affix packages fix remote command execution Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 796-1                                         Michael Stone
September 1st, 2005           
- --------------------------------------------------------------------------

Package        : affix
Vulnerability  : remote command execution
Problem-Type   : unsafe use of popen
Debian-specific: no
CVE ID         : CAN-2005-2716

Kevin Finisterre reports that affix, a package used to manage
bluetooth sessions under Linux, uses the popen call in an unsafe
fashion. A remote attacker can exploit this vulnerability to execute
arbitrary commands on a vulnerable system.

The old stable distribution (woody) does not contain the affix

For the stable distribution (sarge) this problem has been fixed in
version 2.1.1-3.

For the unstable distribution (sid) this problem has been fixed in
version 2.1.2-3.

We recommend that you upgrade your affix package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:    81959 0914c96291c7bf8a4bbf5d05e5dc74c5
      Size/MD5 checksum:      669 616d043f1c72b3a8ebcae37e4a59fb98

  alpha architecture (DEC Alpha)
      Size/MD5 checksum:    93462 a3569622764735b1b09829e575c34a04
      Size/MD5 checksum:    75608 7d0d72ed495c904ca7820624fc66b8b5
      Size/MD5 checksum:   103142 b534a5fbf6f1537456917fe45c5c8c58

  amd64 architecture (AMD x86_64 (AMD64))
      Size/MD5 checksum:    93480 dead16d09da75e9628bae0d3a61cb04d
      Size/MD5 checksum:    64450 ef7ec29b46f95b5255e9ad23243a117c
      Size/MD5 checksum:    71796 0b83fbb8796d06867c26a197393cdbed

  arm architecture (ARM)
      Size/MD5 checksum:    85908 0e58ede6488bd4e9bd3dd4a06201ac7e
      Size/MD5 checksum:    69546 1fb4f727a1215a89fd4e998fc56d1f26
      Size/MD5 checksum:    56844 837b30e2112981a65327993f242d2e62

  hppa architecture (HP PA RISC)
      Size/MD5 checksum:    76626 a701325fa8e52d04da9044b90cf2be5e
      Size/MD5 checksum:    95006 80e8960c60548492a66c6642d9977e82
      Size/MD5 checksum:    68558 a869b9ae8172cb4a2616e500dc3ba34d

  i386 architecture (Intel ia32)
      Size/MD5 checksum:    63360 e98b76db0c1be17fd0a0fad388580e28
      Size/MD5 checksum:    59644 6c1a4dde54ea88022052473c1385418d
      Size/MD5 checksum:    84952 87f0ced911c009e8cad63b1f1f517e0d

  ia64 architecture (Intel ia64)
      Size/MD5 checksum:    93934 95cd1df0416297d184cf5f8a2fd8e6ff
      Size/MD5 checksum:    83676 8eb81855b4e75cc1690cbea79569cceb
      Size/MD5 checksum:   122328 317969cdc70be9a42632329472b425f8

  m68k architecture (Motorola Mc680x0)
      Size/MD5 checksum:    80118 ec2c0265cb1068d676bb0e5dbadeb199
      Size/MD5 checksum:    58458 76faca4c3f9a94e34398927d5024991f
      Size/MD5 checksum:    54970 45bd12213859c4212baf4d1a127d0916

  mips architecture (MIPS (Big Endian))
      Size/MD5 checksum:    97566 1d8e834bd41fb7f062f47c975f25bcb8
      Size/MD5 checksum:    61378 918a6064f35db1800f03529ae32d6ed9
      Size/MD5 checksum:    76436 ee779d182b774efcf033a159a3e1d337

  mipsel architecture (MIPS (Little Endian))
      Size/MD5 checksum:    97296 8c445a7e88c489d53b0f52c46e9d0a50
      Size/MD5 checksum:    76320 32e64b4ee8452a037efc17ec02e6315f
      Size/MD5 checksum:    61012 717b6b4c932547467802ff042948fe08

  powerpc architecture (PowerPC)
      Size/MD5 checksum:    65466 15e4ae116669a5c3431edeed01439790
      Size/MD5 checksum:    94880 8af910d14455e555e6cb5840830c5724
      Size/MD5 checksum:    70092 03882f73d1876f72b3bd8034b20f3f71

  s390 architecture (IBM S/390)
      Size/MD5 checksum:    73034 d1a72f0d825afd50bbbe65d03ac4f492
      Size/MD5 checksum:    66810 3f8535a792cebdd817ff27c3a2dacd5a
      Size/MD5 checksum:    92464 bd4141e5726e01b520b8766e3e1fabdd

  sparc architecture (Sun SPARC/UltraSPARC)
      Size/MD5 checksum:    84816 2b20cbbc4020bad007a38bb8bd69718d
      Size/MD5 checksum:    66094 ae3660011a4422011ce0f202af218f09
      Size/MD5 checksum:    57762 00bdb8e55e4a68cb8675b0220947d423

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
MongoDB Patches Remote Denial-of-Service Vulnerability
DDoS Attack Against GitHub Continues After More Than Four Days
5 keys to hiring security talent
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.