Debian Security Advisory

                                                                                                                                                    • -
Debian Security Advisory DSA 624-1 security@debian.org http://www.debian.org/security/ Martin Schulze January 5th, 2004 http://www.debian.org/security/faq
                                                                                                                                                    • -
Package : zip Vulnerability : buffer overflow Problem-Type : remote Debian-specific: no CVE ID : CAN-2004-1010 A buffer overflow has been discovered in zip, the archiver for .zip files. When doing recursive folder compression the program did not check the resulting path length, which would lead to memory being overwritten. A malicious person could convince a user to create an archive containing a specially crafted path name, which could lead to the execution of arbitrary code. For the stable distribution (woody) this problem has been fixed in version 2.30-5woody2. For the unstable distribution (sid) this problem has been fixed in version 2.30-8. We recommend that you upgrade your zip package.
                                                                                                                                                    • -
Debian Security Advisory DSA 623-1 security@debian.org http://www.debian.org/security/ Martin Schulze January 4th, 2004 http://www.debian.org/security/faq
                                                                                                                                                    • -
Package : nasm Vulnerability : buffer overflow Problem-Type : local Debian-specific: no CVE ID : CAN-2004-1287 Debian Bug : 285889 Jonathan Rockway discovered a buffer overflow in nasm, the general-purpose x86 assembler, which could lead to the execution of arbitrary code when compiling a maliciously crafted assembler source file. For the stable distribution (woody) this problem has been fixed in version 0.98.28cvs-1woody2. For the unstable distribution (sid) this problem has been fixed in version 0.98.38-1.1. We recommend that you upgrade your nasm package.