Debian Security Advisory

DSA-129-1 uucp -- remote denial of service

Date Reported:
27 May 2002
Affected Packages:
uucp
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 4910.
In Mitre's CVE dictionary: CVE-2002-0912.
More information:

We have received reports that in.uucpd, an authentication agent in the uucp package, does not properly terminate certain long input strings. This has been corrected in uucp package version 1.06.1-11potato3 for Debian 2.2 (potato) and in version 1.06.1-18 for the upcoming (woody) release.

We recommend you upgrade your uucp package immediately.

Fixed in:

Debian GNU/Linux 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/uucp_1.06.1-11potato3.diff.gz
http://security.debian.org/dists/stable/updates/main/source/uucp_1.06.1-11potato3.dsc
http://security.debian.org/dists/stable/updates/main/source/uucp_1.06.1.orig.tar.gz
Alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/uucp_1.06.1-11potato3_alpha.deb
ARM:
http://security.debian.org/dists/stable/updates/main/binary-arm/uucp_1.06.1-11potato3_arm.deb
Intel IA-32:
http://security.debian.org/dists/stable/updates/main/binary-i386/uucp_1.06.1-11potato3_i386.deb
Motorola 680x0:
http://security.debian.org/dists/stable/updates/main/binary-m68k/uucp_1.06.1-11potato3_m68k.deb
PowerPC:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/uucp_1.06.1-11potato3_powerpc.deb
Sun Sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/uucp_1.06.1-11potato3_sparc.deb

MD5 checksums of the listed files are available in the original advisory.