Bug#386182: AW: Bug#386182: CVE-2006-4305: remote arbitrary code execution

2006-09-21 Thread debian
Hi,

I am trying to prepare 7.5.00.38, too, but am having difficulties getting it to 
compile.
But I do have the changeset to fix the overflow, and if I can't get build 38 
done by the week-end I will try and apply the fix against 7.5.00.34.

Thanks for your effort.

Martin.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386182: CVE-2006-4305: remote arbitrary code execution

2006-09-20 Thread Steinar H. Gunderson
On Tue, Sep 05, 2006 at 09:47:31PM +0200, Stefan Fritsch wrote:
 Buffer overflow in SAP DB and MaxDB before 7.6.00.30 allows remote
 attackers to execute arbitrary code via a long database name when
 connecting via a WebDBM client.

FWIW, this is also fixed in 7.5.00.38, as far as I can see. It's available
from

  
http://ftp.sunet.se/pub/unix/databases/relational/mysql/Downloads/MaxDB/7.5.00/maxdb-source-7_5_00_38.tgz
   

but I can't the Debian patches to apply cleanly. I'll have a stab at finding
the required fix, but given the size of the changesets between these
sub-revisions, I'm not sure I'll find it.

/* Steinar */
-- 
Homepage: http://www.sesse.net/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#386182: CVE-2006-4305: remote arbitrary code execution

2006-09-05 Thread Stefan Fritsch
Package: maxdb-webtools
Severity: critical
Tags: security

A vulnerability has been found in MaxDB (CVE-2006-4305):

Buffer overflow in SAP DB and MaxDB before 7.6.00.30 allows remote
attackers to execute arbitrary code via a long database name when
connecting via a WebDBM client.

See e.g.
http://secunia.com/advisories/21677
for details


Severity critical because I assume it starts WebDBM by default (introduces a
security hole on systems where you install the package). If this is not the
case, it is only grave.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]