Package: libgeoip1
Severity: important

A vulnerability has been identified in GeoIP, which could be exploited
to conduct directory traversal attacks. This issue is due to an input
validation error in the "GeoIP_update_database_general()"
[GeoIPUpdate.c] function when handling the database filename, which
could be exploited by malicious update servers to overwrite arbitrary
files by sending specially crafted HTTP requests to the
"app/update_getfilename" script.

Affected Products

GeoIP version 1.4.0 and prior

Solution

Apply patch :
http://arctic.org/~dean/patches/GeoIP-1.4.0-update-vulnerability.patch

References

http://www.frsirt.com/english/advisories/2007/0117



-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-486
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)

regards,
-- 
   .''`.  
  : :' :    Alex de Oliveira Silva | enerv
  `. `'     www.enerv.net
    `- 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to