Bug still exists in the current version of ipcheck 0.225-1. Bug was not fixed. Please reopen bug as the script still does not login properly to the router to obtain the required information. Security hole still exists and has not been fixed.

Kevin Galat



Debian Bug Tracking System wrote:
This is an automatic notification regarding your Bug report
#231320: Major Security hole in ipcheck with SMC routers 7004ABR and 7004VBR,
which was filed against the ipcheck package.

It has been closed by one of the developers, namely
Mark Purcell <[EMAIL PROTECTED]>.

Their explanation is attached below.  If this explanation is
unsatisfactory and you have not received a better one in a separate
message then please contact the developer, by replying to this email.

Debian bug tracking system administrator
(administrator, Debian Bugs database)

Received: (at 231320-close) by bugs.debian.org; 21 Feb 2005 08:41:14 +0000
From [EMAIL PROTECTED] Mon Feb 21 00:41:14 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D397y-0000it-00; Mon, 21 Feb 2005 00:41:14 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1D38zG-0006vk-00; Mon, 21 Feb 2005 03:32:14 -0500
From: Mark Purcell <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#231320: fixed in ipcheck 0.225-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 21 Feb 2005 03:32:14 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: X-CrossAssassin-Score: 3


Source: ipcheck
Source-Version: 0.225-1

We believe that the bug you reported is fixed in the latest version of
ipcheck, which is due to be installed in the Debian FTP archive:

ipcheck_0.225-1.diff.gz
  to pool/main/i/ipcheck/ipcheck_0.225-1.diff.gz
ipcheck_0.225-1.dsc
  to pool/main/i/ipcheck/ipcheck_0.225-1.dsc
ipcheck_0.225-1_all.deb
  to pool/main/i/ipcheck/ipcheck_0.225-1_all.deb
ipcheck_0.225.orig.tar.gz
  to pool/main/i/ipcheck/ipcheck_0.225.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mark Purcell <[EMAIL PROTECTED]> (supplier of updated ipcheck package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Format: 1.7
Date: Mon, 21 Feb 2005 08:27:43 +0000
Source: ipcheck
Binary: ipcheck
Architecture: source all
Version: 0.225-1
Distribution: unstable
Urgency: low
Maintainer: Mark Purcell <[EMAIL PROTECTED]>
Changed-By: Mark Purcell <[EMAIL PROTECTED]>
Description: ipcheck - Dyndns.org client to register your dynamic IP address
Closes: 212976 231320 290184
Changes: ipcheck (0.225-1) unstable; urgency=low
.
* New upstream release
* Closes: #231320: Major Security hole in ipcheck with SMC routers
7004ABR and 7004VBR
* Closes: #212976: Please reactivate SSL with Python 2
* Closes: #290184: Improper copyright file
* Update debian/copyright
Files: 97c225b42d090c85ebd5dd073d7b5e81 580 net optional ipcheck_0.225-1.dsc
599eb030af6137a2ad86865b6c43c59d 38295 net optional ipcheck_0.225.orig.tar.gz
fcd246a35533350e7f13fe88f644e992 7885 net optional ipcheck_0.225-1.diff.gz
d55c12a88d6b2fe722647c6ab3f45b30 44878 net optional ipcheck_0.225-1_all.deb


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCGZvDoCzanz0IthIRApZ8AJwIt8hSWsrFM/8Rf9xX655At9CAlACfXhPk
DtsEioAnVeDHrcyM0/8mUqU=
=ioY5
-----END PGP SIGNATURE-----




-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Reply via email to