Executive Summary

Summary
Title New gopher packages fix several vulnerabilities
Informations
Name DSA-638 First vendor Publication 2005-01-13
Vendor Debian Last vendor Modification 2005-01-13
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

"jaguar" has discovered two security relevant problems in gopherd, the Gopher server in Debian which is part of the gopher package. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities:

CAN-2004-0560

An integer overflow can happen when posting content of a specially calculated size.

CAN-2004-0561

A format string vulnerability has been found in the log routine.

For the stable distribution (woody) these problems have been fixed in version 3.0.3woody2.

The unstable distribution (sid) does not contain a gopherd package. It has been replaced by Pygopherd.

We recommend that you upgrade your gopherd package.

Original Source

Url : http://www.debian.org/security/2005/dsa-638

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 638-1 (gopher)
File : nvt/deb_638_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
55703 UMN Gopher Daemon (gopherd) ftp.c Logging Routine Format String

12913 Gopher Server (gopherd) Log Routine Format String

12912 UMN Gopher Daemon (gopherd) do_command() Function Posting Content Overflow

Nessus® Vulnerability Scanner

Date Description
2005-01-18 Name : The remote host is running a Gopher server that is affected by multiple vulne...
File : gopher_overflow.nasl - Type : ACT_DESTRUCTIVE_ATTACK
2005-01-13 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-638.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:33:45
  • Multiple Updates