exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 34239

Secunia Security Advisory 34239
Posted Mar 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for yaws. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 6c32490ed47438e1700fddf0e5e8ae715271645ff8eb24f7b7b9f9331cc6c485

Secunia Security Advisory 34239

Change Mirror Download
----------------------------------------------------------------------

Did you know? Our assessment and impact rating along with detailed
information such as exploit code availability, or if an updated patch
is released by the vendor, is not part of this mailing-list?

Click here to learn more about our commercial solutions:
http://secunia.com/advisories/business_solutions/

Click here to trial our solutions:
http://secunia.com/advisories/try_vi/

----------------------------------------------------------------------

TITLE:
Debian update for yaws

SECUNIA ADVISORY ID:
SA34239

VERIFY ADVISORY:
http://secunia.com/advisories/34239/

DESCRIPTION:
Debian has issued an update for yaws. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

For more information:
SA33979

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 4.0 alias etch --

Oldstable updates are available for alpha, amd64, arm, hppa, i386,
ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65-4etch1.diff.gz
Size/MD5 checksum: 15050 de600331ea301eb9a8cd82987bbecac1
http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65-4etch1.dsc
Size/MD5 checksum: 742 5ff0d18eaf5b0982cab087a0da30546b
http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65.orig.tar.gz
Size/MD5 checksum: 775978 4c08ba6abb40e41a49066a4c35d66102

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65-4etch1_alpha.deb
Size/MD5 checksum: 920326 bcdde19abfa0509a7fec5980ae4c6977

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65-4etch1_amd64.deb
Size/MD5 checksum: 922808 f69d7ec4e1082067e8ce2c5b35088ed7

arm architecture (ARM)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65-4etch1_arm.deb
Size/MD5 checksum: 921284 74360fb5c5ace09cde4a0afe9612b35e

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65-4etch1_i386.deb
Size/MD5 checksum: 923758 b6f68cab4953d114197eecef7e89a5d7

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65-4etch1_ia64.deb
Size/MD5 checksum: 921190 be465d69af82a67b1d0a5e4bf6e21984

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65-4etch1_mips.deb
Size/MD5 checksum: 923582 fa6d77670fee39cfc6bd1cd0c5532786

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65-4etch1_mipsel.deb
Size/MD5 checksum: 919572 a235d55de32b60a838b0ca92fa2e5308

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65-4etch1_powerpc.deb
Size/MD5 checksum: 920814 23d52c172afae1269fccc7a536418fbe

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65-4etch1_s390.deb
Size/MD5 checksum: 919460 39fca419254eaca0a843e4d5a8abfd5e

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.65-4etch1_sparc.deb
Size/MD5 checksum: 784600 ab81930fb47510802e13cd26cad09c73


-- Debian GNU/Linux 5.0 alias lenny --

Stable updates are available for alpha, amd64, arm, armel, hppa,
i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77.orig.tar.gz
Size/MD5 checksum: 838170 7e01d9e8f4fe12895c76081ee4cf7754
http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1.dsc
Size/MD5 checksum: 1206 6b5844871553c42a824f401586aa46a1
http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1.diff.gz
Size/MD5 checksum: 19814 253cfc5da27428df313c4e8b4dfbf93a

Architecture independent packages:

http://security.debian.org/pool/updates/main/y/yaws/yaws-wiki_1.77-3+lenny1_all.deb
Size/MD5 checksum: 200784 8731c7f94f6f3550f142f21d225d918d
http://security.debian.org/pool/updates/main/y/yaws/yaws-chat_1.77-3+lenny1_all.deb
Size/MD5 checksum: 65076 65681b94bf96027c0684bb2d29db00e8
http://security.debian.org/pool/updates/main/y/yaws/yaws-mail_1.77-3+lenny1_all.deb
Size/MD5 checksum: 160840 efdcebae480d452dc628eb715e7f8b22
http://security.debian.org/pool/updates/main/y/yaws/yaws-yapp_1.77-3+lenny1_all.deb
Size/MD5 checksum: 66196 b281bb1587101a3e83d50ffe1e92f6fd

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1_alpha.deb
Size/MD5 checksum: 652508 3e474dff842f080a6897958243c6c0d8

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1_amd64.deb
Size/MD5 checksum: 652258 03053ee15e1b92456785a08e91e5d7e5

arm architecture (ARM)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1_arm.deb
Size/MD5 checksum: 651702 06e61922443dc30ab4c0b144c34a7a2e

armel architecture (ARM EABI)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1_armel.deb
Size/MD5 checksum: 649654 d752e8341ad8797bd0fb5879e53f07dd

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1_hppa.deb
Size/MD5 checksum: 652286 a87d4e8c7ed413812f8b59311c55a689

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1_i386.deb
Size/MD5 checksum: 652642 de9b389be1cb7842b0d8584e0d0a1b18

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1_ia64.deb
Size/MD5 checksum: 653308 f9b75201e1191fb8dd7cf158631a9c89

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1_mips.deb
Size/MD5 checksum: 653008 874547bac10ca979bfeeb065ed895bff

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1_mipsel.deb
Size/MD5 checksum: 651392 37c53dd40471f02f2dfea75c788ea5f5

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1_powerpc.deb
Size/MD5 checksum: 654140 c90a7a7f66fd0e2093d502a5893d9e08

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1_s390.deb
Size/MD5 checksum: 651624 e7ecaf982f7f027475b3c8275e63c8c8

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/y/yaws/yaws_1.77-3+lenny1_sparc.deb
Size/MD5 checksum: 651006 6fbb95dace09ead71d6f335322de5171

-- Debian GNU/Linux unstable alias sid --

Fixed in version 1.80-1

ORIGINAL ADVISORY:
DSA-1740-1:
http://lists.debian.org/debian-security-announce/2009/msg00050.html

OTHER REFERENCES:
SA33979:
http://secunia.com/advisories/33979/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close