exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Linux Security Advisory 749-1

Debian Linux Security Advisory 749-1
Posted Jul 12, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 749-1 - A vulnerability was discovered in the ettercap package which could allow a remote attacker to execute arbitrary code on the system running ettercap.

tags | advisory, remote, arbitrary
systems | linux, debian
advisories | CVE-2005-1796
SHA-256 | bdeef153d602130b85417e5dee12c2d46a6187d93eb4e3c55bde14385ca13c7f

Debian Linux Security Advisory 749-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA 749-1 security@debian.org
http://www.debian.org/security/ Michael Stone
July 10, 2005 http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : ettercap
Vulnerability : arbitrary code execution
Problem type : format string error
Debian-specific: no
CVE Id(s) : CAN-2005-1796

A vulnerability was discovered in the ettercap package which could allow
a remote attacker to execute arbitrary code on the system running
ettercap.

The old stable distribution (woody) did not include ettercap.

For the stable distribution (sarge), this problem has been fixed in
version 0.7.1-1sarge1.

For the unstable distribution (sid), this problem has been fixed in
version 0.7.3-1.

We recommend that you upgrade your ettercap package.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian 3.1 (sarge)
- ------------------

sarge was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1.orig.tar.gz
Size/MD5 checksum: 1121758 f769039e0e967e9e09d0365fe358d683
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1.diff.gz
Size/MD5 checksum: 4027 409603f119d07401bf7671b317e8ccef
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1.dsc
Size/MD5 checksum: 746 12b96cbc18bdb3bd7b431efbbfa73c34

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1sarge1_alpha.deb
Size/MD5 checksum: 262674 3360122f7ee141aa6f2d410f4f834933
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.1-1sarge1_alpha.deb
Size/MD5 checksum: 318266 4b09b93eba161a30b2f6cd28c33d0f1d
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1_alpha.deb
Size/MD5 checksum: 221836 dbe0a871072bcd8d90318b271af1952b

arm architecture (ARM)

http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1sarge1_arm.deb
Size/MD5 checksum: 202390 6feb651f0b27a18e36612804388356e8
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.1-1sarge1_arm.deb
Size/MD5 checksum: 288022 062a0e8b4fdc2985a5bf9f5a0bc14fc4
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1_arm.deb
Size/MD5 checksum: 169426 b08226c852071b61b66c16fd012412ec

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.1-1sarge1_hppa.deb
Size/MD5 checksum: 304744 59be8a0479f3b0c9512e5193865c6bc2
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1sarge1_hppa.deb
Size/MD5 checksum: 227462 c364ecfec15360338b93176d45d759f3
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1_hppa.deb
Size/MD5 checksum: 190422 abbb689c039c829ab4358c4983c96c96

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1sarge1_i386.deb
Size/MD5 checksum: 208398 91059e61c393851e8edb3b841450b46d
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.1-1sarge1_i386.deb
Size/MD5 checksum: 286292 be3fff62821300e02ee004deb7a3bf91
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1_i386.deb
Size/MD5 checksum: 173010 cba1a300d2d2add3c7c8720c287a7d10

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.1-1sarge1_ia64.deb
Size/MD5 checksum: 331966 f316f4df7dfc6ea666288f7aa1ef955b
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1_ia64.deb
Size/MD5 checksum: 256862 64f34b09f95832daa6de66f4e5a9be0b
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1sarge1_ia64.deb
Size/MD5 checksum: 304328 6781371e63adcedd74db7a9435f77a64

m68k architecture (Motorola Mc680x0)

http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1_m68k.deb
Size/MD5 checksum: 153950 310081b9ca119d2ce58c4cc779ea93c9
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1sarge1_m68k.deb
Size/MD5 checksum: 182234 6cea01aa78d8ab57b7365bcf1977f26a
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.1-1sarge1_m68k.deb
Size/MD5 checksum: 284704 9fb2cbc636754bc116bb92136cd662c2

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1_mips.deb
Size/MD5 checksum: 180014 430dad7d762ab3d21ffdf5452d038a6f
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.1-1sarge1_mips.deb
Size/MD5 checksum: 296628 9dceaed8c2623ddb45a82b95f3c44480
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1sarge1_mips.deb
Size/MD5 checksum: 210476 53c398ef40193a1fc5eede9f8b6d5e76

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.1-1sarge1_mipsel.deb
Size/MD5 checksum: 298032 f599e9ca6ecf52622ccfcb3ac6f20bf3
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1_mipsel.deb
Size/MD5 checksum: 182216 1ea0f7044b6b65c56b0d7ebd23842705
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1sarge1_mipsel.deb
Size/MD5 checksum: 212338 c8e0734ab8090a77c84d63b57086dc06

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.1-1sarge1_powerpc.deb
Size/MD5 checksum: 322336 e7ab6f5e567b2cc271f180cb16f70476
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1_powerpc.deb
Size/MD5 checksum: 179370 b1f750e38e742030932ab076d4e62eac
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1sarge1_powerpc.deb
Size/MD5 checksum: 212186 96860165bf4e4e796eeaaea7d8ea4e51

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.1-1sarge1_s390.deb
Size/MD5 checksum: 296358 e2d6fac489aaca1da105b103dcf3c84c
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1_s390.deb
Size/MD5 checksum: 183506 d181a9d198e471ad6634c9b7b3fb6b18
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1sarge1_s390.deb
Size/MD5 checksum: 216164 f480772db37197c2ed364b61185e90f6

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.1-1sarge1_sparc.deb
Size/MD5 checksum: 289156 f3de4592a6ec6678c36499fe6ed59915
http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1_sparc.deb
Size/MD5 checksum: 169062 880af57dc7c562dbd0a668878115b5f4
http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1sarge1_sparc.deb
Size/MD5 checksum: 201582 08f5653424161a44534bb0c5346cab53

- -------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iQCVAwUBQtFgdw0hVr09l8FJAQL5zwP8CnBQpF0xNEB1us9bONz2Zd6e8EPeYjNt
IODViTb4FawBYggVWBwAfh+XJkQO/hhLoigkJLLaIngx+bPYju5xMpANz4tB1KVe
Rr2CCMOvZrfz+Uv+AQgtEbnxhZ9XBfar00PJwPbFoXT3BpSgidpqeswdhRiF9bjy
yL5fMgsd6Zo=
=M00Q
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close