Debian alert: New irssi-text packages fix denial of service

Posted by dave on Aug 23, 2002 6:03 AM EDT
Mailing list
Mail this story
Print this story

The IRC client irssi is vulnerable to a denial of service condition. The problem occurs when a user attempts to join a channel that has an overly long topic description. When a certain string is appended to the topic, irssi will crash.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 157-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
August 23rd, 2002                       http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : irssi-text
Vulnerability  : denial of service
Problem-Type   : remote
Debian-specific: no
BugTraq ID     : 5055

The IRC client irssi is vulnerable to a denial of service condition.
The problem occurs when a user attempts to join a channel that has an
overly long topic description.  When a certain string is appended to
the topic, irssi will crash.

This problem has been fixed in version 0.8.4-3.1 for the current
stable stable distribution (woody) and in version 0.8.5-2 for the
unstable distribution (sid).  The old stable distribution (potato) is
not affected, since the corresponding portions of code are not
present.  The same applies to irssi-gnome and irssi-gtk, which don't
seem to be affected as well.

We recommend that you upgrade your irssi-text package.

wget url
	will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1.dsc
      Size/MD5 checksum:      649 45ddefa3d91a9b66c56160a5c017b2a7
    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1.diff.gz
      Size/MD5 checksum:    72951 e31eed9f81003ba318e841f3fd5f5119
    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4.orig.tar.gz
      Size/MD5 checksum:   952304 57bf9d89638be3d377be211f0b0d7049

  Alpha architecture:

    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_alpha.deb
      Size/MD5 checksum:   903334 1016a920949b3dd3a2a2ff0a5691a050

  ARM architecture:

    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_arm.deb
      Size/MD5 checksum:   754340 615076b56439436f3757dc48bc294233

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_i386.deb
      Size/MD5 checksum:   695000 9557d0cce86def75e96636781c68716e

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_ia64.deb
      Size/MD5 checksum:  1291782 b5eaa3db75572cffdd490093ea99a1ec

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_hppa.deb
      Size/MD5 checksum:   890694 9981ad90d84232736e152ff59f533048

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_m68k.deb
      Size/MD5 checksum:   683516 6bcafbf18d79d3113a2d2e15adbcc72e

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_mips.deb
      Size/MD5 checksum:   776628 a819f3ae3a7f6eb2b7de4935c50a92a2

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_mipsel.deb
      Size/MD5 checksum:   776688 e6cbc3580de13997477cec0d4f4b6102

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_powerpc.deb
      Size/MD5 checksum:   760356 cb2027ac3fb685d5126b7d89e9c7bbbc

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_s390.deb
      Size/MD5 checksum:   725678 3862d7d4ba5a3933507a976dd3855541

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_sparc.deb
      Size/MD5 checksum:   764396 527d18a16fa8f59bd0b950a758062527


  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE9ZkCZW5ql+IAeqTIRAsYbAKCeIzSwNb1+Vsb4ve2Ok5CLcSouZwCfVp7E
Ce1q/1KV0u6x3VV2Byxe1JI=
=VPMk
-----END PGP SIGNATURE-----


  Nav
» Read more about: Story Type: Security; Groups: Debian

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.