found 506377 1.61.27-1
found 506377 1.63.5-1
thanks

hi Raphael,

On Thu, Nov 20, 2008 at 06:28:45PM -0600, Raphael Geissert wrote:
> The following CVE (Common Vulnerabilities & Exposures) id was published for 
> streamripper.

looking at the source it seems that the version in stable is affected here too,
not the same functions but the code in general:

 httplib_parse_url():
    /* search for a login '@' token */
    if (strchr(url, '@') != NULL) {
    ret = sscanf(url, "%[^:]:[EMAIL PROTECTED]", urlinfo->username, 
urlinfo->password);

[..]

so patch has to be backportet.

Im forwarding to [EMAIL PROTECTED] Ive already prepared a fixed 1.63.5
package for unstable/lenny which im going to upload as soon as you guys give me
your OK :-)


> 
> CVE-2008-4829/SA32562[1]:
> > Secunia Research has discovered some vulnerabilities in Streamripper, which
> > can be exploited by malicious people to compromise a user's system.
> >
> > 1) A boundary error exists within the function "http_parse_sc_header()" in
> > lib/http.c when parsing an overly long HTTP header starting with
> > "Zwitterion v".
> >
> > 2) A boundary error exists within the function "http_get_pls()" in
> > lib/http.c when parsing a specially crafted pls playlist containing an
> > overly long entry.
> >
> > 3) A boundary error exists within the function "http_get_m3u()" in
> > lib/http.c when parsing a specially crafted m3u playlist containing an
> > overly long "File" entry.
> >
> > Successful exploitation allows the execution of arbitrary code, but
> > requires that a user is tricked into connecting to a malicious server.
> >
> > The vulnerabilities are confirmed in version 1.63.5. Other versions may
> > also be affected.
> 
> The patch by upstream to fix the vulnerabilities can be found at [2].
> 
> It would be great if you could verify whether the version in etch is also 
> affected.
> 
> If you fix the vulnerability please also make sure to include the CVE id in 
> the changelog entry.
> 
> [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4829
>      http://security-tracker.debian.net/tracker/CVE-2008-4829
>      http://secunia.com/Advisories/32562/
> [2]http://streamripper.cvs.sourceforge.net/viewvc/streamripper/sripper_1x/lib/http.c?view=patch&r1=1.50&r2=1.51&pathrev=sripper-1_64_0
> 
> Cheers,
> -- 
> Raphael Geissert - Debian Maintainer
> www.debian.org - get.debian.net





--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to