reopen 323386
tags 323386 etch sarge 
retitle 323386 kismet: Security vulnerabilities CAN-2005-2626 and CAN-2005-2627 
present in sarge and etch
thanks

Dear maintainer, the version currently distributed of kismet in stable and 
testing has several security issues. You should reopen a security 
bug right after an upload and tag it appropiately so it can be tracked
in our other distributions.

More information on these issues is available at:
http://www.kismetwireless.net/blog/?entry=/kismet/entry-1124158146.txt

" Released version 2005-08-R1, addressing several potentially critical security
flaws:

1. Handling of unprintable characters in the SSID. I still can't replicate
this one myself, but people reported it, and I've made the handling of
unprintables much more obvious and correct.

2. Integer underflows in pcap handling. These were meaningless for normal
operation (only applied to kernel headers, and if you own the kernel, owning
kismet is pointless) but they could cause heap corruption/exploitation on
replaying a pcapfile w/ kernel headers.

3. Integer underflow in data frame dissection. This is the most serious, and
could lead to heap exploits with malformed remote data.

I still don't have info about the exact nature of the exploits announced at
Defcon, but I can't wait any longer. The current issues fixed are serious,
and may encompass the announced exploits. "

For more information see also
http://www.frsirt.com/english/advisories/2005/1422

Since the versions available in previous Debian releases predates this one
the maintainer should determine wether the version in stable is indeed
vulnerable and contact the Debian Security Team with a patch so a DSA
is issued. The bug should be retained once a DSA is issued and tagged
'etch' to track the evolution of this bug until the current version in
sid (2005.08.R1-1) moves in to testing.

Regards

Javier

Note: The Gentoo advisory might also be of help:
http://www.gentoo.org/security/en/glsa/glsa-200508-10.xml

Attachment: signature.asc
Description: Digital signature

Reply via email to