-------------------------------------------------------------------------- Alerta de Segurança Debian DSA 936-1 security@debian.org http://www.debian.org/security/ Martin Schulze 11 de Janeiro de 2006 http://www.debian.org/security/faq -------------------------------------------------------------------------- Essa é uma tradução do DSA (Debian Security Advisory - Alerta de Segurança Debian) que é enviado para a lista [1]debian-security-announce e, por esse motivo, há um atraso entre o anúncio original em inglês e esta tradução. Caso queira receber os alertas em inglês, [2]inscreva-se na lista. 1.http://lists.debian.org/debian-security-announce 2.http://www.debian.org/MaillingLists/subscribe@debian-security-announce -------------------------------------------------------------------------- Vulnerabilidade : estouro de pilha Tipo de Problema : remoto Específico Debian: não CVE ID : [3]CAN-2005-3191 [4]CAN-2005-3192 [5]CAN-2005-3193 [6]CVE-2005-3624 [7]CVE-2005-3625 [8]CVE-2005-3626 [9]CVE-2005-3627 [10]CVE-2005-3628 "infamous41md" e Chris Evans descobriram vários estouros de pilha baseados em "heap" no xpdf, a suíte para Formato de Documentos Portáveis ("PDF"), que também está presente na libextractor, uma biblioteca para extrair meta dados arbitrários de arquivos, e que poderá levar a uma negação de serviço pela quebra da aplicação ou, possivelmente, a uma execução de código arbitrário. A antiga distribuição estável ("woody") não contém pacotes libextractor. Para a distribuição estável ("sarge") estes problemas foram corrigidos na versão 0.4.2-2sarge2. Para a distribuição instável ("sid") estes problemas serão corrigidos logo. Recomendamos que você atualize seus pacotes libextractor. Corrigido em: Debian GNU/Linux 3.1 (sarge) Fonte: http://security.debian.org/pool/updates/main/libe/libextractor/libextractor_0.4.2-2sarge2.dsc http://security.debian.org/pool/updates/main/libe/libextractor/libextractor_0.4.2-2sarge2.diff.gz http://security.debian.org/pool/updates/main/libe/libextractor/libextractor_0.4.2.orig.tar.gz Alpha: http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_alpha.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_alpha.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_alpha.deb AMD64: http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_amd64.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_amd64.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_amd64.deb ARM: http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_arm.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_arm.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_arm.deb Intel IA-32: http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_i386.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_i386.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_i386.deb Intel IA-64: http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_ia64.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_ia64.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_ia64.deb HPPA: http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_hppa.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_hppa.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_hppa.deb Motorola 680x0: http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_m68k.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_m68k.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_m68k.deb Big endian MIPS: http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_mips.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_mips.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_mips.deb Little endian MIPS: http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_mipsel.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_mipsel.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_mipsel.deb PowerPC: http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_powerpc.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_powerpc.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_powerpc.deb IBM S/390: http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_s390.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_s390.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_s390.deb Sun Sparc: http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge2_sparc.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge2_sparc.deb http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge2_sparc.deb Checksums MD5 dos arquivos listados estão disponíveis no alerta [11]original. 3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3191 4.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3192 5.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3193 6.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624 7.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625 8.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626 9.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627 10.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628 11.http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00008.html -- Marco Carvalho (macs) <marcocarvalho89@yahoo.com.br> ******************************************************************* .''`. Debian Weekly News: <http://www.debian.org/News/weekly> : :' : Debian BR.........: <http://debian-br.cipsga.org.br> `. `'` Equipe de Imprensa e Traduções do Debian-BR `- O que você quer saber hoje?
Attachment:
signature.asc
Description: Digital signature