LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: 2071-1: libmikmod: buffer overflows Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Dyon Balding discovered buffer overflows in the MikMod sound library, which could lead to the execution of arbitrary code if a user is tricked into opening malformed Impulse Tracker or Ultratracker sound files. [More...]
- ------------------------------------------------------------------------
Debian Security Advisory DSA-2071-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
July 14, 2010                         http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : libmikmod
Vulnerability  : buffer overflows
Problem type   : local(remote)
Debian-specific: no
CVE Id(s)      : CVE-2009-3995 CVE-2009-3996

Dyon Balding discovered buffer overflows in the MikMod sound library, 
which could lead to the execution of arbitrary code if a user is 
tricked into opening malformed Impulse Tracker or Ultratracker sound 
files.

For the stable distribution (lenny), these problems have been fixed in
version 3.1.11-6+lenny1.

For the unstable distribution (sid), these problems have been fixed in
version 3.1.11-6.2.

We recommend that you upgrade your libmikmod packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod_3.1.11-6+lenny1.dsc
    Size/MD5 checksum:     1038 9741350a41a54261dbf242f02aa325fd
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod_3.1.11.orig.tar.gz
    Size/MD5 checksum:   611590 705106da305e8de191549f1e7393185c
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod_3.1.11-6+lenny1.diff.gz
    Size/MD5 checksum:   336630 4e4d04d2c9b5bcdd3edb3b04e683ea86

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_alpha.deb
    Size/MD5 checksum:   221696 e01fb2f9c7e693ae7b0727a552da31a1
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_alpha.deb
    Size/MD5 checksum:   378570 dd8abb7da4195af53aed1e57750d2f1f

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_amd64.deb
    Size/MD5 checksum:   157216 b3836423b8875f21d5ae01d5f9b533c5
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_amd64.deb
    Size/MD5 checksum:   265776 935b94d522dd814337b06acd07184fb7

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_arm.deb
    Size/MD5 checksum:   164040 f2fdc8c7f4c7f54ec75ffd179c98ddca
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_arm.deb
    Size/MD5 checksum:   264064 2eba8b4037ca117fc8920563d2b05ca3

armel architecture (ARM EABI)

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_armel.deb
    Size/MD5 checksum:   155766 916c6a467219ed4a5e0da68168c1e591
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_armel.deb
    Size/MD5 checksum:   254664 77c56898614f92c30e0ad5ef2de7c0cc

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_hppa.deb
    Size/MD5 checksum:   185910 6b044e5ce0fb2de4fc37a8ddbbd037a0
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_hppa.deb
    Size/MD5 checksum:   299236 40db7231bf6258319f45412c1d46df50

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_i386.deb
    Size/MD5 checksum:   244570 c4363c834307008b053bb1899a13013f
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_i386.deb
    Size/MD5 checksum:   147266 3d8adb8a243afb7a614052ba7494e01e

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_ia64.deb
    Size/MD5 checksum:   264426 c2d6c1a0d1b32ff27030ec2f1cd3ebe4
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_ia64.deb
    Size/MD5 checksum:   391590 39c904baed7a4462ccbf10805cae88c0

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_mips.deb
    Size/MD5 checksum:   167728 708a04685879d374730d4b94dd87a7d8
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_mips.deb
    Size/MD5 checksum:   292908 f52fce4500f59af99befc30fab46d48d

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_mipsel.deb
    Size/MD5 checksum:   291132 c1c7fa74ce5a2d4e580aae5f5db21b8d
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_mipsel.deb
    Size/MD5 checksum:   167172 65bd1438a4cac985a0dc555f9b0eb54f

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_powerpc.deb
    Size/MD5 checksum:   284010 0d98c66f1cbc9c34f87d1c9721fa7681
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_powerpc.deb
    Size/MD5 checksum:   173082 a953d970966c47adc2d55d2c5959835b

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_s390.deb
    Size/MD5 checksum:   172646 e10ca9b6552459194a6d6d46799103dd
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_s390.deb
    Size/MD5 checksum:   268534 98768623fa899a4e2835dfced3b90d10

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_sparc.deb
    Size/MD5 checksum:   150056 ed9837041b097d69e887eacce18917df
  http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_sparc.deb
    Size/MD5 checksum:   256132 bb7c09b265c54f42447199100d626c32


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
'Snowden effect' has changed cloud data security assumption, survey claims
Galaxy S5 fingerprint scanner hacked with glue mould
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.