int(1277)

Vulnerability Bulletins


Múltiples vulnerabilidades en gopher

Vulnerability classification

Property Value
Confidence level Oficial
Impact Denegación de Servicio
Dificulty Avanzado
Required attacker level Acceso remoto con cuenta

System information

Property Value
Affected manufacturer GNU/Linux
Affected software gopher

Description

Se han encontrado dos vulnerabilidades en gopher:

CAN-2004-0560 - Se ha encontrado un desbordamiento de entero al publicar contenidos de un tamaño especifico.

CAN-2004-0561 - Existe un bug de formato en la rutina de log.

Solution



Actualización de software

Debian Linux

Debian Linux 3.0
Source:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2.dsc
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_alpha.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_arm.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_i386.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_ia64.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_hppa.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_m68k.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_mips.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_mipsel.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_powerpc.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_s390.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_sparc.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_sparc.deb

Standar resources

Property Value
CVE CAN-2004-0560
BID

Other resources

Debian Security Advisory DSA-638-1
http://www.debian.org/security/2005/dsa-638

Version history

Version Comments Date
1.0 Aviso emitido 2005-01-14
Ministerio de Defensa
CNI
CCN
CCN-CERT