Vulnerability Bulletins |
Múltiples vulnerabilidades en mc |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Denegación de Servicio |
Dificulty | Avanzado |
Required attacker level | Acceso remoto sin cuenta a un servicio estandar |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | mc |
Description |
|
Se han encontrado múltiples vulnerabilidades en mc: CAN-2004-1004 - Múltiples bugs de formato CAN-2004-1005 - Múltiples desbordamientos de búfer CAN-2004-1009 - Vulnerabilidad de loop infinito CAN-2004-1090 - Denegación de servicio mediante una cabecera corrupta. CAN-2004-1091 - Denegación de servicio mediante referencia nula CAN-2004-1092 - Liberación de memoria no alocatada CAN-2004-1093 - Denegación de servicio mediante memoria libreada CAN-2004-1174 - Denegación de servicio mediante mediante la manipulación del manejo de ficheros no existentes CAN-2004-1175 - Ejecución de aplicaciones inintencionadamente CAN-2004-1176 - Denegación de servicio mediante un desbordamiento de búfer. |
|
Solution |
|
Actualización de software Debian Linux Debian Linux 3.0 Source: http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5.dsc http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5.diff.gz http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55.orig.tar.gz Alpha: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_alpha.deb http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_alpha.deb http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_alpha.deb ARM: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_arm.deb http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_arm.deb http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_arm.deb Intel IA-32: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_i386.deb http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_i386.deb http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_i386.deb Intel IA-64: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_ia64.deb http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_ia64.deb http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_ia64.deb HPPA: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_hppa.deb http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_hppa.deb http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_hppa.deb Motorola 680x0: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_m68k.deb http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_m68k.deb http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_m68k.deb Big endian MIPS: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_mips.deb http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_mips.deb http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_mips.deb Little endian MIPS: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_mipsel.deb http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_mipsel.deb http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_mipsel.deb PowerPC: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_powerpc.deb http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_powerpc.deb http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_powerpc.deb IBM S/390: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_s390.deb http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_s390.deb http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_s390.deb Sun Sparc: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_sparc.deb http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_sparc.deb http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_sparc.deb SUSE Linux Distribuciones basadas en SUSE Linux - Actualizar mediante YaST Online Update Red Hat Linux Red Hat Enterprise Linux AS (v. 2.1) Red Hat Enterprise Linux WS (v. 2.1) Red Hat Linux Advanced Workstation 2.1 Itanium Processor https://rhn.redhat.com/ |
|
Standar resources |
|
Property | Value |
CVE |
CAN-2004-1004 CAN-2004-1005 CAN-2004-1009 CAN-2004-1090 CAN-2004-1091 CAN-2004-1092 CAN-2004-1093 CAN-2004-1174 CAN-2004-1175 CAN-2004-1176 |
BID | |
Other resources |
|
Debian Security Advisory DSA-639-1 http://www.debian.org/security/2005/dsa-639 SUSE Security Summary Report SUSE-SR:2005:003 http://www.novell.com/linux/security/advisories/2005_03_sr.html Red Hat Security Advisory RHSA-2005:217-10 https://rhn.redhat.com/errata/RHSA-2005-217.html Red Hat Security Advisory RHSA-2005:512-08 https://rhn.redhat.com/errata/RHSA-2005-512.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2005-01-17 |
1.1 | Aviso emitido por SUSE (SUSE-SR:2005:003) | 2005-02-07 |
1.2 | Aviso emitido por Red Hat (RHSA-2005:217-10) | 2005-03-04 |
1.3 | Aviso emitido por Red Hat (RHSA-2005:512-08) | 2005-06-17 |