LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: New libast packages fix arbitrary code execution Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Johnny Mast discovered a buffer overflow in libast, the library of assorted spiffy things, that can lead to the execution of arbitary code. This library is used by eterm which is installed setgid uid which leads to a vulnerability to alter the utmp file.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 976-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
February 15th, 2006                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : libast, libast1
Vulnerability  : buffer overflow
Problem type   : local
Debian-specific: no
CVE ID         : CVE-2006-0224

Johnny Mast discovered a buffer overflow in libast, the library of
assorted spiffy things, that can lead to the execution of arbitary
code.  This library is used by eterm which is installed setgid uid
which leads to a vulnerability to alter the utmp file.

For the old stable distribution (woody) this problem has been fixed in
version 0.4-3woody2.

For the stable distribution (sarge) this problem has been fixed in
version 0.6-0pre2003010606sarge1.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your libast packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2.dsc
      Size/MD5 checksum:      611 7ae117d391242963294499b684e783b6
    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2.diff.gz
      Size/MD5 checksum:   127092 fd7f99bde6a540fe50c27761b63e27cf
    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4.orig.tar.gz
      Size/MD5 checksum:   150283 9424286314c1d816699b28964b91d015

  Alpha architecture:

    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_alpha.deb
      Size/MD5 checksum:    30314 549273ceedb6d3836361ec4308df13b7
    http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_alpha.deb
      Size/MD5 checksum:    46418 324e44548cf1c1ae9befb810f3ebc3cc

  ARM architecture:

    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_arm.deb
      Size/MD5 checksum:    28496 702865048ba5822eef10de3cd9007819
    http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_arm.deb
      Size/MD5 checksum:    37076 e454fa52adb41c91c0e9b806caf1418c

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_i386.deb
      Size/MD5 checksum:    24804 cb4f324b197dad2f1069af530e1f7051
    http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_i386.deb
      Size/MD5 checksum:    33096 2eae854498d4ee6a27badcf8603cab7e

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_ia64.deb
      Size/MD5 checksum:    37426 fab097ad84832a872a0af9f6b61a4db7
    http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_ia64.deb
      Size/MD5 checksum:    47926 530f9e8878f21ee1f2dbcb0dbd16db7d

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_hppa.deb
      Size/MD5 checksum:    30870 9c9be1baeb94f828c281db145cac7e45
    http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_hppa.deb
      Size/MD5 checksum:    45820 e782f8f5846a48d7eb8a2791c61255e8

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_m68k.deb
      Size/MD5 checksum:    25178 4293a0569fb9f3266e8644e332c1f2bf
    http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_m68k.deb
      Size/MD5 checksum:    32990 b78f08fede449151bde20f5b4ee82ea2

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_mips.deb
      Size/MD5 checksum:    24826 ccdf8838e4a6c7c7ecc29916d76af616
    http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_mips.deb
      Size/MD5 checksum:    40754 9ea070dc4626dadb799bd45eeb27269b

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_mipsel.deb
      Size/MD5 checksum:    24932 2b5ff0209b86917d9e31ca111e57dffb
    http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_mipsel.deb
      Size/MD5 checksum:    40440 ec95a2b1e72608b7deb882df9b7d7eef

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_powerpc.deb
      Size/MD5 checksum:    28186 ec060589a8ac75ebb4da6cf071698503
    http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_powerpc.deb
      Size/MD5 checksum:    41774 9ebee23c3319be0192868528f3f82c36

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_s390.deb
      Size/MD5 checksum:    27124 f7a1cd1dff3d333919825565958c36d1
    http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_s390.deb
      Size/MD5 checksum:    33494 48314490169bae367f5e93dedc58b6a0

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_sparc.deb
      Size/MD5 checksum:    30330 c620f4c7d89db5f750a1ba792d8f5f95
    http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_sparc.deb
      Size/MD5 checksum:    38862 50c09ef80e55176619c4b65ea0191bc2


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/liba/libast/libast_0.6-0pre2003010606sarge1.dsc
      Size/MD5 checksum:      576 9420ee95768da2f860552aac0b32b5e6
    http://security.debian.org/pool/updates/main/liba/libast/libast_0.6-0pre2003010606sarge1.tar.gz
      Size/MD5 checksum:   390719 52a0ee946d87bdf807d0a18b71bbf5e2

  Alpha architecture:

    http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_alpha.deb
      Size/MD5 checksum:    67308 524177839f05a53e16da08d221cf4270
    http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_alpha.deb
      Size/MD5 checksum:   127226 6dad9a361f0ec9550bfb06325f6eca9b

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_amd64.deb
      Size/MD5 checksum:    63212 5274afc640d0abb29f71c8445506aa6c
    http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_amd64.deb
      Size/MD5 checksum:    94440 43c04d451f85e18b68be0fc83d62fdd9

  ARM architecture:

    http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_arm.deb
      Size/MD5 checksum:    55832 4987f49c1ed5d819cb91386474216675
    http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_arm.deb
      Size/MD5 checksum:    90590 09e5736d3ae6ba985dcc86607536aad3

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_i386.deb
      Size/MD5 checksum:    56184 3baf39df1af7fb0370f1487d97fa328d
    http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_i386.deb
      Size/MD5 checksum:    84908 26f77c7997a59f621d3ec32a563fd0f4

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_ia64.deb
      Size/MD5 checksum:    77708 744fe6d6a70465912b66f42e7ab0f650
    http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_ia64.deb
      Size/MD5 checksum:   123406 7e47159f62b98acce66f18aa1fb3059a

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_hppa.deb
      Size/MD5 checksum:    65842 3a61b0d8cfb2b93da56bca7695ab34c5
    http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_hppa.deb
      Size/MD5 checksum:   104328 da13a39f4f86b7b06f18e143e6697a9b

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_m68k.deb
      Size/MD5 checksum:    54526 df42f2ef3b882894e5d7062474a03f7a
    http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_m68k.deb
      Size/MD5 checksum:    80642 4f3f46861e8cf01acfa83c5cb99761e6

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_mips.deb
      Size/MD5 checksum:    55404 0fe139bd8d3ab4082b0368418158e5cf
    http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_mips.deb
      Size/MD5 checksum:   100148 842ed436fd72d2763551d0b5c727f6f0

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_mipsel.deb
      Size/MD5 checksum:    55708 e6fef4a2764657e3a6c5379ad4ca734b
    http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_mipsel.deb
      Size/MD5 checksum:    99892 8006e1709f1170b4cb68f12029abf246

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_powerpc.deb
      Size/MD5 checksum:    58540 51c6c2e4c1e31f127995e5b2305f0e4b
    http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_powerpc.deb
      Size/MD5 checksum:    98048 fabbf05a9a0d89b311cfc6153d807fcc

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_s390.deb
      Size/MD5 checksum:    63928 78518a64a55be0d18f82ec1610e756dc
    http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_s390.deb
      Size/MD5 checksum:    90818 0c68ab4af0d61a5a5e5cce80827c81ca

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_sparc.deb
      Size/MD5 checksum:    57060 8efa5b2512f3a5e209c7b5512d129479
    http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_sparc.deb
      Size/MD5 checksum:    91510 abb85b30007dbe82c7a20b4040d4e7aa


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Mobile Device Encryption Could Lead to a ‘Very, Very Dark Place’, FBI Director Says
What a hacker can learn about your life from the coffee shop’s Wi-Fi network
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.