[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2007/dsa-1273.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1273.wml	2017-11-01 10:11:09.703803791 +0500
+++ russian/security/2007/dsa-1273.wml	2018-03-14 12:14:46.923102281 +0500
@@ -1,51 +1,52 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in nas, the Network Audio
- -System.</p>
+<p>Ð? nas, Network Audio System, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
- -<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1543";>CVE-2007-1543</a> 
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1543";>CVE-2007-1543</a>
 
- -<p>A stack-based buffer overflow in the accept_att_local function in
- -server/os/connection.c in nas allows remote attackers to execute
- -arbitrary code via a long path slave name in a USL socket connection.</p></li>
+<p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии accept_att_local в server/os/connection.c
+в nas позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й
+код Ñ? помоÑ?Ñ?Ñ? длинного имени пÑ?Ñ?и в Ñ?океÑ?-Ñ?оединении USL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1544";>CVE-2007-1544</a>
 
- -<p>An integer overflow in the ProcAuWriteElement function in
- -server/dia/audispatch.c allows remote attackers to cause a denial of
- -service (crash) and possibly execute arbitrary code via a large
- -max_samples value.</p></li>
+<p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?Ñ?нкÑ?ии ProcAuWriteElement в server/dia/audispatch.c
+позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ?
+оÑ?Ñ?ановка) и поÑ?енÑ?иалÑ?но вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? болÑ?Ñ?ого
+знаÑ?ениÑ? max_samples.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1545";>CVE-2007-1545</a>
 
- -<p>The AddResource function in server/dia/resource.c allows remote
- -attackers to cause a denial of service (server crash) via a
- -nonexistent client ID.</p></li>
+<p>ФÑ?нкÑ?иÑ? AddResource в server/dia/resource.c позволÑ?еÑ? Ñ?далÑ?ннÑ?м
+злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка Ñ?еÑ?веÑ?а) Ñ?
+помоÑ?Ñ?Ñ? неÑ?Ñ?Ñ?еÑ?Ñ?вÑ?Ñ?Ñ?его клиенÑ?Ñ?кого иденÑ?иÑ?икаÑ?оÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1546";>CVE-2007-1546</a>
 
- -<p>An array index error allows remote attackers to cause a denial of service
- -(crash) via (1) large num_action values in the ProcAuSetElements
- -function in server/dia/audispatch.c or (2) a large inputNum parameter
- -to the compileInputs function in server/dia/auutil.c.</p></li>
+<p>Ð?Ñ?ибка индекÑ?аÑ?ии маÑ?Ñ?ива позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в
+обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) Ñ? помоÑ?Ñ?Ñ? (1) болÑ?Ñ?иÑ? знаÑ?ений num_action в Ñ?Ñ?нкÑ?ии
+ProcAuSetElements в server/dia/audispatch.c, либо (2) болÑ?Ñ?ого паÑ?амеÑ?Ñ?а inputNum
+Ñ?Ñ?нкÑ?ии compileInputs в server/dia/auutil.c.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1547";>CVE-2007-1547</a>
 
- -<p>The ReadRequestFromClient function in server/os/io.c allows remote
- -attackers to cause a denial of service (crash) via multiple
- -simultaneous connections, which triggers a NULL pointer dereference.</p></li>
+<p>ФÑ?нкÑ?иÑ? ReadRequestFromClient в server/os/io.c позволÑ?еÑ? Ñ?далÑ?ннÑ?м
+злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) Ñ? помоÑ?Ñ?Ñ?
+множеÑ?Ñ?веннÑ?Ñ? одновÑ?еменнÑ?Ñ? Ñ?оединений, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?азÑ?менованиÑ? NULL-Ñ?казаÑ?елÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge), these problems have been fixed in
- -version 1.7-2sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.7-2sarge1.</p>
 
- -<p>For the upcoming stable distribution (etch) and the unstable
- -distribution (sid) these problems have been fixed in version 1.8-4.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном (etch) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.8-4.</p>
 
- -<p>We recommend that you upgrade your nas package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? nas.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=MJGQ
-----END PGP SIGNATURE-----


Reply to: