- --------------------------------------------------------------------------Debian Security Advisory DSA 952-1                     security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
January 23rd, 2006                      http://www.debian.org/security/faq
- --------------------------------------------------------------------------Package        : libapache-auth-ldap
Vulnerability  : format string
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2006-0150

"Seregorn" discovered a format string vulnerability in the logging
function of libapache-auth-ldap, an LDAP authentication module for the
Apache webserver, that can lead to the execution of arbitrary code.

For the old stable distribution (woody) this problem has been fixed in
version 1.6.0-3.1.

For the stable distribution (sarge) this problem has been fixed in
version 1.6.0-8.1

The unstable distribution (sid) does no longer contain libapache-auth-ldap.

We recommend that you upgrade your libapache-auth-ldap package.


Upgrade Instructions
- --------------------wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------  Source archives:

          Size/MD5 checksum:      652 6ef1d9323674ef6a5f076b3b65ccf60e
          Size/MD5 checksum:     3927 e8197f2db55a7c9e570ee5f72bc3ff39
          Size/MD5 checksum:    79058 de283639b40e3f359ad6e4a65cad1813

  Alpha architecture:

          Size/MD5 checksum:    71528 46f26f6c68fa1e900e7c3b4b6f65e83c

  ARM architecture:

          Size/MD5 checksum:    69554 59ed4e025245a4b2397530f165d7a20e

  Intel IA-32 architecture:

          Size/MD5 checksum:    68958 1bded30a2554d58d8a856e61477b42ba

  Intel IA-64 architecture:

          Size/MD5 checksum:    75804 a7af3cc2e12376a386659e118064efb3

  HP Precision architecture:

          Size/MD5 checksum:    71264 4ee43bc263b35ec2dd199bfde43d890d

  Motorola 680x0 architecture:

          Size/MD5 checksum:    69354 ade63074b9f3ff1c6f46ff19262ecf2d

  Big endian MIPS architecture:

          Size/MD5 checksum:    68724 2ffc67d01923a581918344100a8461ae

  Little endian MIPS architecture:

          Size/MD5 checksum:    68656 e69c65426f6d102e2da0fa204e8a3b59

  PowerPC architecture:

          Size/MD5 checksum:    70020 920814cda6c57190e68160c087b76bea

  IBM S/390 architecture:

          Size/MD5 checksum:    69386 c74da92420df9b49c48f3bd6487d8579

  Sun Sparc architecture:

          Size/MD5 checksum:    72126 6c28b218349faffe5a8789315b41d212


Debian GNU/Linux 3.1 alias sarge
- --------------------------------  Source archives:

          Size/MD5 checksum:      672 823af0881e3fc9ecaaf4ec4de445a2a1
          Size/MD5 checksum:     5015 f3d65a99091bb695e9cdeb6f27c28a1b
          Size/MD5 checksum:    79058 de283639b40e3f359ad6e4a65cad1813

  Alpha architecture:

          Size/MD5 checksum:    71318 fd007ba23080c94b621351ea8d4c3e2d

  AMD64 architecture:

          Size/MD5 checksum:    70800 f056405e0dd083eba4e1a97ee972be10

  ARM architecture:

          Size/MD5 checksum:    69298 a6475d8a98ca1687d30367b24fdcdee6

  Intel IA-32 architecture:

          Size/MD5 checksum:    69192 ddce8c4e7958dac6dd637f210f3690ea

  Intel IA-64 architecture:

          Size/MD5 checksum:    74662 07480ce393dfe2c820cdfed1e09c3fad

  HP Precision architecture:

          Size/MD5 checksum:    71836 ffb117f0c3b8ca64181509172717441e

  Motorola 680x0 architecture:

          Size/MD5 checksum:    69592 2d2436f78415a7032b7724ffc94711f2

  Big endian MIPS architecture:

          Size/MD5 checksum:    69240 93eeb7ec212188e9fc66a38100ae0fb2

  Little endian MIPS architecture:

          Size/MD5 checksum:    69142 e5d3c43b616478ffea76c6708726436e

  PowerPC architecture:

          Size/MD5 checksum:    71252 81e2369976e82a79babf4efd10a9c903

  IBM S/390 architecture:

          Size/MD5 checksum:    70750 3fef60cf062e9f28ef8d3a85ef43ca91

  Sun Sparc architecture:

          Size/MD5 checksum:    69736 fe571fe5a8d149fd8a33e00e95ef9408


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Debian: New libapache-auth-ldap packages fix arbitrary code execution

January 27, 2006
"Seregorn" discovered a format string vulnerability in the logging function of libapache-auth-ldap, an LDAP authentication module for the Apache webserver, that can lead to the e...

Summary

Severity

Related News