Múltiples vulnerabilidades en gopher
|
Vulnerability classification
|
Property |
Value |
Confidence level |
Oficial |
Impact |
Denegación de Servicio |
Dificulty |
Avanzado |
Required attacker level |
Acceso remoto con cuenta |
System information
|
Property |
Value |
Affected manufacturer |
GNU/Linux |
Affected software |
gopher |
Description
|
Se han encontrado dos vulnerabilidades en gopher:
CAN-2004-0560 - Se ha encontrado un desbordamiento de entero al publicar contenidos de un tamaño especifico.
CAN-2004-0561 - Existe un bug de formato en la rutina de log. |
Solution
|
Actualización de software
Debian Linux
Debian Linux 3.0
Source:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2.dsc
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_alpha.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_arm.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_i386.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_ia64.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_hppa.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_m68k.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_mips.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_mipsel.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_powerpc.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_s390.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_sparc.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_sparc.deb |
Standar resources
|
Property |
Value |
CVE |
CAN-2004-0560 |
BID |
NULL |
Other resources
|
Debian Security Advisory DSA-638-1
http://www.debian.org/security/2005/dsa-638 |