Your message dated Sat, 16 Feb 2013 18:02:04 +0000
with message-id <[email protected]>
and subject line Bug#697987: fixed in ettercap 1:0.7.3-2.1+squeeze1
has caused the Debian Bug report #697987,
regarding ettercap: CVE-2013-0722: stack-based buffer overflow when parsing 
hosts list
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
697987: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697987
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: ettercap
Severity: important
Tags: security

Hi,

the following vulnerability was published for ettercap.

CVE-2013-0722[0]:
stack-based buffer overflow when parsing hosts list

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] http://security-tracker.debian.org/tracker/CVE-2013-0722
[1] http://marc.info/?s=CVE-2013-0722&l=oss-security
[2] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0722

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: ettercap
Source-Version: 1:0.7.3-2.1+squeeze1

We believe that the bug you reported is fixed in the latest version of
ettercap, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Barak A. Pearlmutter <[email protected]> (supplier of updated ettercap package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 14 Jan 2013 14:14:15 +0000
Source: ettercap
Binary: ettercap-common ettercap ettercap-gtk
Architecture: source amd64
Version: 1:0.7.3-2.1+squeeze1
Distribution: stable
Urgency: high
Maintainer: Murat Demirten <[email protected]>
Changed-By: Barak A. Pearlmutter <[email protected]>
Description: 
 ettercap   - Multipurpose sniffer/interceptor/logger for switched LAN
 ettercap-common - Common support files and plugins for ettercap
 ettercap-gtk - Multipurpose sniffer/interceptor/logger for switched LAN
Closes: 697987
Changes: 
 ettercap (1:0.7.3-2.1+squeeze1) stable; urgency=high
 .
   * Quilt patch for CVE-2013-0722, a stack-based buffer overflow when
     parsing hosts list (closes: #697987)
Checksums-Sha1: 
 a92a8cae1ebbb8efca882cda233cf482a8c99519 1188 ettercap_0.7.3-2.1+squeeze1.dsc
 737c49779e2495c8c184292b871b5ae4ebfca241 6548 
ettercap_0.7.3-2.1+squeeze1.diff.gz
 c64b6b6785b880fba0b119b2e3bd97b6ec38ee25 315914 
ettercap-common_0.7.3-2.1+squeeze1_amd64.deb
 394384388054c90ed0e8304ad15513d7a4d7459f 207112 
ettercap_0.7.3-2.1+squeeze1_amd64.deb
 3ef925c5d303f83d9204fb27fc34c110010827e5 246586 
ettercap-gtk_0.7.3-2.1+squeeze1_amd64.deb
Checksums-Sha256: 
 dc882ee22608dd0ba3307852883088a99a71472f4dc12e3581493181faf4c797 1188 
ettercap_0.7.3-2.1+squeeze1.dsc
 fe0adbb12b34022ee1a14ece790298f2196d851688fd17904138d79725adfacc 6548 
ettercap_0.7.3-2.1+squeeze1.diff.gz
 d2f2152d13a0a8c24096ab1430cf35c92a036458cf838417a55f860458d5e7b4 315914 
ettercap-common_0.7.3-2.1+squeeze1_amd64.deb
 7009c0295cdf0e92b1c6293ec6d1497dd8cb1e39ad044d87e8a0e728836fe253 207112 
ettercap_0.7.3-2.1+squeeze1_amd64.deb
 9720eab372caff2778e09480a8e7877328cb3a689b666828e971f71aee8b6bc5 246586 
ettercap-gtk_0.7.3-2.1+squeeze1_amd64.deb
Files: 
 41f8a3d2a96135e60d33c2bf75cc9c81 1188 net optional 
ettercap_0.7.3-2.1+squeeze1.dsc
 196fd6cbd6d0d62542cf70d81c58b9a0 6548 net optional 
ettercap_0.7.3-2.1+squeeze1.diff.gz
 1c95bbdfbd5042e3f651c7070c532098 315914 net optional 
ettercap-common_0.7.3-2.1+squeeze1_amd64.deb
 ce100094287a8967efb23ac6b76753f2 207112 net optional 
ettercap_0.7.3-2.1+squeeze1_amd64.deb
 a436591534020c5c5d14527e8ca7d8a9 246586 net optional 
ettercap-gtk_0.7.3-2.1+squeeze1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlD1ZXwACgkQLz4Gnv7CP7LRFgCgkQQmSzFThkB+6CCZULmw6Ty5
qvUAoLnSiZu59WVEtJI7M9ETRqW3u4Ht
=UrSw
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to