Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:5613
HistoryJan 09, 2004 - 12:00 a.m.

[SECURITY] [DSA 414-1] New jabber packages fix denial of service

2004-01-0900:00:00
vulners.com
14

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Debian Security Advisory DSA 414-1 [email protected]
http://www.debian.org/security/ Matt Zimmerman
January 6th, 2004 http://www.debian.org/security/faq


Package : jabber
Vulnerability : denial of service
Problem-Type : remote
Debian-specific: no
CVE Ids : CAN-2004-0013

A vulnerability was discovered in jabber, an instant messaging server,
whereby a bug in the handling of SSL connections could cause the
server process to crash, resulting in a denial of service.

For the current stable distribution (woody) this problem has been
fixed in version 1.4.2a-1.1woody1.

For the unstable distribution (sid) this problem has been fixed in
version 1.4.3-1.

We recommend that you update your jabber package.

Upgrade Instructions


wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:

http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1.dsc
  Size/MD5 checksum:      580 efa342add13e86c05cb394604aab89d0
http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1.diff.gz
  Size/MD5 checksum:    61467 d8b19d51fc83095db7132e1c5abc651c
http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a.orig.tar.gz
  Size/MD5 checksum:   690217 10780dbdb93926ea5bb360e1186b939c

Alpha architecture:

http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_alpha.deb
  Size/MD5 checksum:   241262 e1dfb66863a3392f0e078503fc070ba3

ARM architecture:

http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_arm.deb
  Size/MD5 checksum:   207750 4f6554511245c45dea401b767e60f8b8

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_i386.deb
  Size/MD5 checksum:   196148 522769b98c8daafcbc98248c41bce10c

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_ia64.deb
  Size/MD5 checksum:   356460 e30221687c1df3ce1e04d56f07e18073

HP Precision architecture:

http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_hppa.deb
  Size/MD5 checksum:   226222 e62ee0c273d73f325339a954058a6836

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_m68k.deb
  Size/MD5 checksum:   200616 7dcda4e913787e0511eb4dc148ce61ea

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_mips.deb
  Size/MD5 checksum:   203188 7124007a61770fc8146eaa7969757dd2

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_mipsel.deb
  Size/MD5 checksum:   202356 31d39182928dca472a77a516fab60698

PowerPC architecture:

http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_powerpc.deb
  Size/MD5 checksum:   205032 6a4ea17882063074292b7682abeb032a

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_s390.deb
  Size/MD5 checksum:   210494 d631c49818c85f5b6b003c115b36b7cf

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_sparc.deb
  Size/MD5 checksum:   224836 90d74ff4bc33673515d47e8ede21f6fa

These files will probably be moved into the stable distribution on
its next revision.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>' and http://packages.debian.org/&lt;pkg&gt;
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQE/+1oJArxCt0PiXR4RAmFKAKDZhlXQeKTrcNiLMhF3RGJCd1avZwCdEFmk
g1JNGOzrB5wplcMLf6xtzo8=
=8CXB
-----END PGP SIGNATURE-----

Related for SECURITYVULNS:DOC:5613