what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 19276

Secunia Security Advisory 19276
Posted Mar 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for crossfire. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 352c70069bfb848fd4351b0c3acd7d8072942eea7f693155a41d2832b4bcc2e0

Secunia Security Advisory 19276

Change Mirror Download


TITLE:
Debian update for crossfire

SECUNIA ADVISORY ID:
SA19276

VERIFY ADVISORY:
http://secunia.com/advisories/19276/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux 3.0
http://secunia.com/product/143/

DESCRIPTION:
Debian has issued an update for crossfire. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially to compromise a vulnerable
system.

For more information:
SA19237

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.0 alias woody --

Source archives:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire_1.1.0-1woody2.dsc
Size/MD5 checksum: 648 c87ae4538c9f9ce8af57fddcdddf3c9e
http://security.debian.org/pool/updates/main/c/crossfire/crossfire_1.1.0-1woody2.diff.gz
Size/MD5 checksum: 47426 6b0532a7a8748e3e5a5d81dc25350d13
http://security.debian.org/pool/updates/main/c/crossfire/crossfire_1.1.0.orig.tar.gz
Size/MD5 checksum: 3057431 824e6d9a91ee0321629a9e99ad4e264f

Architecture independent components:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-doc_1.1.0-1woody2_all.deb
Size/MD5 checksum: 584480 1c75de6980f66906bd52fbca399e2857

Alpha architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody2_alpha.deb
Size/MD5 checksum: 193802 a932826e54d713e18d5393e9036fda02
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody2_alpha.deb
Size/MD5 checksum: 2097946 e9dca904054c7fcf5bcf29e294ad333b

ARM architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody2_arm.deb
Size/MD5 checksum: 156404 89d0da5ac8daffb2e6e064a9eb84fe8b
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody2_arm.deb
Size/MD5 checksum: 1994212 f4ce8a9b872dd465f748ce2e706801e4

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody2_i386.deb
Size/MD5 checksum: 141220 5f5913df2c1a253d1b4d23ef91877712
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody2_i386.deb
Size/MD5 checksum: 1954014 9c1c622d75f4a1125c74e7910a9a1842

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody2_ia64.deb
Size/MD5 checksum: 243816 97e96103f5b19a73963a14041f12d141
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody2_ia64.deb
Size/MD5 checksum: 2224064 1b392240b1de7ef6cc5656a0244d45b0

HP Precision architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody2_hppa.deb
Size/MD5 checksum: 175634 52f5ff61bc7c8eeab9aef678ccd023b0
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody2_hppa.deb
Size/MD5 checksum: 2047990 ae204aed290fe71f37f2fd8693c1acb3

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody2_m68k.deb
Size/MD5 checksum: 131890 3470c9b54fa4afe91af8d855260756f9
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody2_m68k.deb
Size/MD5 checksum: 1925486 b0057f324e5faafec58416264d42e423

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody2_mips.deb
Size/MD5 checksum: 170520 0853eab7b91be44f7340712aa4cdd671
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody2_mips.deb
Size/MD5 checksum: 2035256 79844b4d370cafd330e94566a0d648ff

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody2_mipsel.deb
Size/MD5 checksum: 169288 33b97adf5cac97c6c875bdd4b36e381c
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody2_mipsel.deb
Size/MD5 checksum: 2035352 bc8cb7e86de9a7d8dd45a2304f7c5a16

PowerPC architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody2_powerpc.deb
Size/MD5 checksum: 162678 bb01745d0447bf0ff0059e021582f573
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody2_powerpc.deb
Size/MD5 checksum: 1998462 5984f0c34413a56816d251f667eb8742

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody2_s390.deb
Size/MD5 checksum: 146146 363914f85b686bb91c6b70acbbe12b73
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody2_s390.deb
Size/MD5 checksum: 1969362 fd2f926627e1007841d31cdeb74f82eb

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.1.0-1woody2_sparc.deb
Size/MD5 checksum: 156562 5a114c075a3a74b6a67309131417d505
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.1.0-1woody2_sparc.deb
Size/MD5 checksum: 1986776 ed5b96118b9ee6e037dbc931782ade23

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire_1.6.0.dfsg.1-4sarge2.dsc
Size/MD5 checksum: 712 29da4111a63870ce67ed75a14a4c338c
http://security.debian.org/pool/updates/main/c/crossfire/crossfire_1.6.0.dfsg.1-4sarge2.diff.gz
Size/MD5 checksum: 284676 5e40a45fac4a9b0cb828cdd20a8ec3d5
http://security.debian.org/pool/updates/main/c/crossfire/crossfire_1.6.0.dfsg.1.orig.tar.gz
Size/MD5 checksum: 4329330 67c8ee71b0539d369231764b19cc787e

Architecture independent components:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-doc_1.6.0.dfsg.1-4sarge2_all.deb
Size/MD5 checksum: 888740 8d5bca10c51c61f905118dd1342bd5e0

Alpha architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge2_alpha.deb
Size/MD5 checksum: 374720 f0d7b9d29175e6c782397abae95bda50
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge2_alpha.deb
Size/MD5 checksum: 2759264 2d103be9f1139ccef05292419a7f9fe6

AMD64 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge2_amd64.deb
Size/MD5 checksum: 340982 d6a0d30f69c174e65798444b26a7ffbf
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge2_amd64.deb
Size/MD5 checksum: 2643944 76f0702338eabd86bacc5bf7770d7659

ARM architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge2_arm.deb
Size/MD5 checksum: 333522 71d3c49ff54106298d8e719d5c1f41ca
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge2_arm.deb
Size/MD5 checksum: 2639562 7a22211f4745afa931da217d160d3ba0

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge2_i386.deb
Size/MD5 checksum: 329094 8106898d7874492399f83ffbb2ac52f2
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge2_i386.deb
Size/MD5 checksum: 2625260 5e52ce516bf3ab4c100cc9f7ff51787d

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge2_ia64.deb
Size/MD5 checksum: 409472 e1bd34614a0833aa566a73f48de8532f
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge2_ia64.deb
Size/MD5 checksum: 2854244 7f0ebd5971220d7beaaeedf2bf796f75

HP Precision architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge2_hppa.deb
Size/MD5 checksum: 351562 f050142a068a5ff3db8672826ba3a2cc
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge2_hppa.deb
Size/MD5 checksum: 2682006 68c5cf62151994d83e0c23fbc71711f0

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge2_m68k.deb
Size/MD5 checksum: 307692 2053682d4e1c6fc81f2a27c9bffa8229
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge2_m68k.deb
Size/MD5 checksum: 2570064 97af44855c45fdc51c39639654a344e0

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge2_mips.deb
Size/MD5 checksum: 348728 4186c9554fdfe3d7b9d90a6c7f5c1b8d
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge2_mips.deb
Size/MD5 checksum: 2657662 db60d5c20ede7be0ba33ca5b9ddfdd8e

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge2_mipsel.deb
Size/MD5 checksum: 347064 152226eb00bbe0650bf763e9b47af923
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge2_mipsel.deb
Size/MD5 checksum: 2656254 40764b19b22bc2e75f83146e6a0e72d9

PowerPC architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge2_powerpc.deb
Size/MD5 checksum: 342622 a58d7ae35a639e20d0a42826654c0fcf
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge2_powerpc.deb
Size/MD5 checksum: 2651940 b9558856a293a97527919b784009bae9

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge2_s390.deb
Size/MD5 checksum: 336700 07dae1c1fb770e9474bdbbed7847def6
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge2_s390.deb
Size/MD5 checksum: 2642014 457a9bd118ff00e5bd257c8887cc40c8

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/c/crossfire/crossfire-edit_1.6.0.dfsg.1-4sarge2_sparc.deb
Size/MD5 checksum: 330976 6cfb55259f593ee029a1ed670fb1dfb8
http://security.debian.org/pool/updates/main/c/crossfire/crossfire-server_1.6.0.dfsg.1-4sarge2_sparc.deb
Size/MD5 checksum: 2626952 b4bddff33520b2ef2f8b16a08201ed6d

-- Debian GNU/Linux unstable alias sid --

Fixed in version 1.9.0-2.

ORIGINAL ADVISORY:
http://www.debian.org/security/2006/dsa-1009

OTHER REFERENCES:
SA19237:
http://secunia.com/advisories/19237/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close