Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: 2071-1: libmikmod: buffer overflows Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Dyon Balding discovered buffer overflows in the MikMod sound library, which could lead to the execution of arbitrary code if a user is tricked into opening malformed Impulse Tracker or Ultratracker sound files. [More...]
- ------------------------------------------------------------------------
Debian Security Advisory DSA-2071-1                               Moritz Muehlenhoff
July 14, 2010               
- ------------------------------------------------------------------------

Package        : libmikmod
Vulnerability  : buffer overflows
Problem type   : local(remote)
Debian-specific: no
CVE Id(s)      : CVE-2009-3995 CVE-2009-3996

Dyon Balding discovered buffer overflows in the MikMod sound library, 
which could lead to the execution of arbitrary code if a user is 
tricked into opening malformed Impulse Tracker or Ultratracker sound 

For the stable distribution (lenny), these problems have been fixed in
version 3.1.11-6+lenny1.

For the unstable distribution (sid), these problems have been fixed in
version 3.1.11-6.2.

We recommend that you upgrade your libmikmod packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:
    Size/MD5 checksum:     1038 9741350a41a54261dbf242f02aa325fd
    Size/MD5 checksum:   611590 705106da305e8de191549f1e7393185c
    Size/MD5 checksum:   336630 4e4d04d2c9b5bcdd3edb3b04e683ea86

alpha architecture (DEC Alpha)
    Size/MD5 checksum:   221696 e01fb2f9c7e693ae7b0727a552da31a1
    Size/MD5 checksum:   378570 dd8abb7da4195af53aed1e57750d2f1f

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:   157216 b3836423b8875f21d5ae01d5f9b533c5
    Size/MD5 checksum:   265776 935b94d522dd814337b06acd07184fb7

arm architecture (ARM)
    Size/MD5 checksum:   164040 f2fdc8c7f4c7f54ec75ffd179c98ddca
    Size/MD5 checksum:   264064 2eba8b4037ca117fc8920563d2b05ca3

armel architecture (ARM EABI)
    Size/MD5 checksum:   155766 916c6a467219ed4a5e0da68168c1e591
    Size/MD5 checksum:   254664 77c56898614f92c30e0ad5ef2de7c0cc

hppa architecture (HP PA RISC)
    Size/MD5 checksum:   185910 6b044e5ce0fb2de4fc37a8ddbbd037a0
    Size/MD5 checksum:   299236 40db7231bf6258319f45412c1d46df50

i386 architecture (Intel ia32)
    Size/MD5 checksum:   244570 c4363c834307008b053bb1899a13013f
    Size/MD5 checksum:   147266 3d8adb8a243afb7a614052ba7494e01e

ia64 architecture (Intel ia64)
    Size/MD5 checksum:   264426 c2d6c1a0d1b32ff27030ec2f1cd3ebe4
    Size/MD5 checksum:   391590 39c904baed7a4462ccbf10805cae88c0

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:   167728 708a04685879d374730d4b94dd87a7d8
    Size/MD5 checksum:   292908 f52fce4500f59af99befc30fab46d48d

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:   291132 c1c7fa74ce5a2d4e580aae5f5db21b8d
    Size/MD5 checksum:   167172 65bd1438a4cac985a0dc555f9b0eb54f

powerpc architecture (PowerPC)
    Size/MD5 checksum:   284010 0d98c66f1cbc9c34f87d1c9721fa7681
    Size/MD5 checksum:   173082 a953d970966c47adc2d55d2c5959835b

s390 architecture (IBM S/390)
    Size/MD5 checksum:   172646 e10ca9b6552459194a6d6d46799103dd
    Size/MD5 checksum:   268534 98768623fa899a4e2835dfced3b90d10

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:   150056 ed9837041b097d69e887eacce18917df
    Size/MD5 checksum:   256132 bb7c09b265c54f42447199100d626c32

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show ' and
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.