nix für uns
Grüße

On Sun, Dec 14, 2008 at 9:23 PM, Moritz Muehlenhoff <[email protected]> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> - ------------------------------------------------------------------------
> Debian Security Advisory DSA-1686-1                  [email protected]
> http://www.debian.org/security/                       Moritz Muehlenhoff
> December 14, 2008                     http://www.debian.org/security/faq
> - ------------------------------------------------------------------------
>
> Package        : no-ip
> Vulnerability  : buffer overflow
> Problem type   : remote
> Debian-specific: no
> CVE Id(s)      : CVE-2008-5297
> Debian Bug     : 506179
>
> A buffer overflow has been discovered in the HTTP parser of the No-IP.com
> Dynamic DNS update client, which may result in the execution of arbitrary
> code.
>
> For the stable distribution (etch), this problem has been fixed in
> version 2.1.1-4+etch1.
>
> For the upcoming stable distribution (lenny) and the unstable distribution
> (sid), this problem has been fixed in version 2.1.7-11.
>
> We recommend that you upgrade your no-ip package.
>
> Upgrade instructions
> - --------------------
>
> wget url
>        will fetch the file for you
> dpkg -i file.deb
>        will install the referenced file.
>
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
>
> apt-get update
>        will update the internal database
> apt-get upgrade
>        will install corrected packages
>
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
>
>
> Debian GNU/Linux 4.0 alias etch
> - -------------------------------
>
> Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips,
> mipsel, powerpc, s390 and sparc.
>
> Source archives:
>
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1.diff.gz
>    Size/MD5 checksum:     5099 991539fbaabc7808f1e6540e6d2a7d37
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1.orig.tar.gz
>    Size/MD5 checksum:    70553 a743fcd40699596d25347083eca86d52
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1.dsc
>    Size/MD5 checksum:      573 a46cc0befc6409b256e76abceec2bba8
>
> alpha architecture (DEC Alpha)
>
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_alpha.deb
>    Size/MD5 checksum:    25552 72ada61d338c9ca7ccf22de55168de1b
>
> amd64 architecture (AMD x86_64 (AMD64))
>
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_amd64.deb
>    Size/MD5 checksum:    22740 eea473fb4410d7b7953150139378b56c
>
> arm architecture (ARM)
>
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_arm.deb
>    Size/MD5 checksum:    21486 eb86554f2e2b20c382810bcfce21ac96
>
> hppa architecture (HP PA RISC)
>
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_hppa.deb
>    Size/MD5 checksum:    23778 7212e0f6ef1b749de5531ff279fe63d1
>
> i386 architecture (Intel ia32)
>
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_i386.deb
>    Size/MD5 checksum:    20838 44598c7737861f61e7c6f012c65228f7
>
> ia64 architecture (Intel ia64)
>
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_ia64.deb
>    Size/MD5 checksum:    30888 ba8e62cc6fe5bf70631710b699adb9da
>
> mips architecture (MIPS (Big Endian))
>
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_mips.deb
>    Size/MD5 checksum:    23936 f3d9215b718a083354e9b9426577aafb
>
> mipsel architecture (MIPS (Little Endian))
>
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_mipsel.deb
>    Size/MD5 checksum:    23854 69f6d783ff8345c565910877e2db4909
>
> powerpc architecture (PowerPC)
>
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_powerpc.deb
>    Size/MD5 checksum:    22514 550fe870f5d0cb85e2ab96c510d70127
>
> s390 architecture (IBM S/390)
>
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_s390.deb
>    Size/MD5 checksum:    22842 37f9132b2f6aae1a828405ae701a325c
>
> sparc architecture (Sun SPARC/UltraSPARC)
>
>
> http://security.debian.org/pool/updates/main/n/no-ip/no-ip_2.1.1-4+etch1_sparc.deb
>    Size/MD5 checksum:    21020 191248685382bb6051853bba9081f012
>
>
>  These files will probably be moved into the stable distribution on
>  its next update.
>
> -
> ---------------------------------------------------------------------------------
> For apt-get: deb http://security.debian.org/ stable/updates main
> For dpkg-ftp: 
> ftp://security.debian.org/debian-securitydists/stable/updates/main
> Mailing list: [email protected]
> Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
>
>
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (GNU/Linux)
>
> iEYEARECAAYFAklFavwACgkQXm3vHE4uylr6PACfecCxr6ytpCw+L6lwdkRCO1E+
> +osAoMrr6OmEO0SRfP5ViXSr4hglrye5
> =H5rj
> -----END PGP SIGNATURE-----
>
>
> --
> To UNSUBSCRIBE, email to [email protected]
> with a subject of "unsubscribe". Trouble? Contact
> [email protected]
>
> You received this message because you are subscribed to the info
> mailinglist.
>
>
>
>
>


-- 
Call-a-Consultant

Dipl.-Wirtschafts-Ing. (FH)
Stefan Häck, MBA
Senior Consultant

Mobil: 0173 / 993 5424
Fon:   07304 / 40 8814
Fax:   07304 / 43 4732

Mail: [email protected]

www.call-a-consultant.de

Reply via email to