Debian Security Advisory DSA 624-1 security@
debian.org
http://www.debian.org/security/ Martin Schulze
January 5th, 2004
http://www.debian.org/security/faq
Package : zip
Vulnerability : buffer overflow
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-1010
A buffer overflow has been discovered in zip, the archiver for .zip
files. When doing recursive folder compression the program did not
check the resulting path length, which would lead to memory being
overwritten. A malicious person could convince a user to create an
archive containing a specially crafted path name, which could lead to
the execution of arbitrary code.
For the stable distribution (woody) this problem has been fixed in
version 2.30-5woody2.
For the unstable distribution (sid) this problem has been fixed in
version 2.30-8.
We recommend that you upgrade your zip package.
Debian Security Advisory DSA 623-1 security@
debian.org
http://www.debian.org/security/ Martin Schulze
January 4th, 2004
http://www.debian.org/security/faq
Package : nasm
Vulnerability : buffer overflow
Problem-Type : local
Debian-specific: no
CVE ID : CAN-2004-1287
Debian Bug : 285889
Jonathan Rockway discovered a buffer overflow in nasm, the
general-purpose
x86 assembler, which could lead to the execution of
arbitrary code when compiling a maliciously crafted assembler source
file.
For the stable distribution (woody) this problem has been fixed in
version 0.98.28cvs-1woody2.
For the unstable distribution (sid) this problem has been fixed in
version 0.98.38-1.1.
We recommend that you upgrade your nasm package.