what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 19194

Secunia Security Advisory 19194
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for crossfire. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 46ed58cfb49192362962db455a67423fc07e2940154250faa315f385684fac01

Secunia Security Advisory 19194

Change Mirror Download


TITLE:
Debian update for crossfire

SECUNIA ADVISORY ID:
SA19194

VERIFY ADVISORY:
http://secunia.com/advisories/19194/

CRITICAL:
Moderately critical

IMPACT:
DoS

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux 3.0
http://secunia.com/product/143/
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/

DESCRIPTION:
Debian has issued an update for crossfire. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

For more information:
SA19044

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.0 alias woody --

Source archives:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire_1.1.0-1woody1.dsc
Size/MD5 checksum: 646 4ff35e7baf70ac9b4d876a343df40523
http://security.debian.org/pool/updates/main/c/crossfire/crossfire_1.1.0-1woody1.diff.gz
Size/MD5 checksum: 46407 7071659d9ec374fb41e20c5016f3a238
http://security.debian.org/pool/updates/main/c/crossfire/crossfire_1.1.0.orig.tar.gz
Size/MD5 checksum: 3057431 824e6d9a91ee0321629a9e99ad4e264f

Architecture independent components:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-doc_1.1.0-1woody1_all.deb
Size/MD5 checksum: 584300 aa7bf89a453427102d7eec4901958158

Alpha architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody1_alpha.deb
Size/MD5 checksum: 193680 4553b585641d5db5f9d3e903cbbe6398
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody1_alpha.deb
Size/MD5 checksum: 2097780 26d3b684b495b0f76fa405baffff8a9c

ARM architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody1_arm.deb
Size/MD5 checksum: 156280 fb833dd6ddea050831a878f4d5dac277
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody1_arm.deb
Size/MD5 checksum: 1993866 fc828be05ece9869a8b09efda952ac47

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody1_i386.deb
Size/MD5 checksum: 141064 04096cf1a3b3f82ad6a1b2d75e125990
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody1_i386.deb
Size/MD5 checksum: 1954024 24b5735f4f798b110e11cab773b94e5f

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody1_ia64.deb
Size/MD5 checksum: 243704 13d507b4def182c7eb01b0aaa3542e29
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody1_ia64.deb
Size/MD5 checksum: 2223706 5ff21345dda8ae6f76165f9b96834b0b

HP Precision architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody1_hppa.deb
Size/MD5 checksum: 175512 7a53530fe3a05303eef58f1306c761dc
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody1_hppa.deb
Size/MD5 checksum: 2047542 77c5b0976be319841e9f7d9a494633e9

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody1_m68k.deb
Size/MD5 checksum: 134514 73f71be557835f00d90110c0e26b585c
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody1_m68k.deb
Size/MD5 checksum: 1925234 7b19ddb9146470eed7476a9ddcb6df9d

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody1_mips.deb
Size/MD5 checksum: 170386 64dcc9e48ef8cad2c7f49d912c48af4c
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody1_mips.deb
Size/MD5 checksum: 2034962 8c961860a9608559ffcbb3491e3aa91d

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody1_mipsel.deb
Size/MD5 checksum: 169156 128739ca220efa5f4c99aa75ba372e48
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody1_mipsel.deb
Size/MD5 checksum: 2034944 d4c48f6b3321ab16858019fb24a990f4

PowerPC architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody1_powerpc.deb
Size/MD5 checksum: 159470 9b7d6cd71d50bf74c0d86de967583e95
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody1_powerpc.deb
Size/MD5 checksum: 1998154 e22fc08568e1ad53d00232974ae4a9b1

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody1_s390.deb
Size/MD5 checksum: 146038 77725d3b5096df841f4cc07122c7c374
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody1_s390.deb
Size/MD5 checksum: 1969130 3419823da4526d93c4ff51422944b292

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody1_sparc.deb
Size/MD5 checksum: 156446 5c15333247f6b01c5fe0f82f74793a05
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody1_sparc.deb
Size/MD5 checksum: 1986454 86501cb8bbdde74d5ed1daa3e28fa1b1

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire_1.6.0.dfsg.1-4sarge1.dsc
Size/MD5 checksum: 710 47cf0dc050c3dc4db58feeac549aed6a
http://security.debian.org/pool/updates/main/c/crossfire/crossfire_1.6.0.dfsg.1-4sarge1.diff.gz
Size/MD5 checksum: 283564 f407edbb32e765296efe129e603fec6f
http://security.debian.org/pool/updates/main/c/crossfire/crossfire_1.6.0.dfsg.1.orig.tar.gz
Size/MD5 checksum: 4329330 67c8ee71b0539d369231764b19cc787e

Architecture independent components:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-doc_1.6.0.dfsg.1-4sarge1_all.deb
Size/MD5 checksum: 888620 2fe92277b2bd97e3440234fb65817fac

Alpha architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge1_alpha.deb
Size/MD5 checksum: 374622 e83523a6abcb34c15d1c9f32c371089c
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge1_alpha.deb
Size/MD5 checksum: 2758858 28c6d5160b86915dfcdac14bdb4f06c7

AMD64 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge1_amd64.deb
Size/MD5 checksum: 340890 80a175aa2524814233248fac42766563
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge1_amd64.deb
Size/MD5 checksum: 2643524 6e1771cf2c74e2154c6cc22c62f4681d

ARM architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge1_arm.deb
Size/MD5 checksum: 333436 6def0c031898c5ec8246ccc0dd2511e6
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge1_arm.deb
Size/MD5 checksum: 2639280 95872038843c495c25793f95c9ba2580

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge1_i386.deb
Size/MD5 checksum: 331954 aedcbf3efa10e18e2853d67006aa21d1
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge1_i386.deb
Size/MD5 checksum: 2625970 47c01f7b6c84046dfbf9a6a2915ae175

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge1_ia64.deb
Size/MD5 checksum: 409386 3f688ee42afd52b1ee6a7a3a46435c14
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge1_ia64.deb
Size/MD5 checksum: 2853944 8de1e21285619250aef448616a577bed

HP Precision architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge1_hppa.deb
Size/MD5 checksum: 351444 8ee33d936f8e4a07e4035e1160a84036
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge1_hppa.deb
Size/MD5 checksum: 2681792 d0a273db4abcfc9231a19332ad843c1d

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge1_m68k.deb
Size/MD5 checksum: 307588 9908a5d79b36a911c4f46215ebd02862
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge1_m68k.deb
Size/MD5 checksum: 2569634 222e9afbaa4bcb7182031ed72af4bc28

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge1_mips.deb
Size/MD5 checksum: 348636 f750bed26179ba592aea5e4d79f3e2bb
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge1_mips.deb
Size/MD5 checksum: 2657484 432448d5d3ae242f95604aee81edc252

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge1_mipsel.deb
Size/MD5 checksum: 346952 32515c7690ce503fbe1651122b7795ad
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge1_mipsel.deb
Size/MD5 checksum: 2656172 7ff1f217d75468a101f09c67e6674604

PowerPC architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge1_powerpc.deb
Size/MD5 checksum: 339274 7d54740e5324c9d50b6114c6cb84ccb2
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge1_powerpc.deb
Size/MD5 checksum: 2651374 973073875b386fd8ac3fbfa7b77b2147

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge1_s390.deb
Size/MD5 checksum: 336618 acb44c42b2a086051324c1a647875bb4
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge1_s390.deb
Size/MD5 checksum: 2641718 5713c0271c677bb6d172ce0df82f7b96

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge1_sparc.deb
Size/MD5 checksum: 330882 32e90607bd43ebb138af8fb5ba168934
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge1_sparc.deb
Size/MD5 checksum: 2626822 e763b98558e078806c0bb357ec3fc2ee


-- Debian GNU/Linux unstable alias sid --

Fixed in version 1.9.0-1.

ORIGINAL ADVISORY:
http://www.debian.org/security/2006/dsa-1001

OTHER REFERENCES:
SA19044:
http://secunia.com/advisories/19044/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close