Summary
The remote host is missing an update to mc
announced via advisory DSA 639-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20639-1
Insight
Andrew V. Samoilov has noticed that several bugfixes which were applied to the source by upstream developers of mc, the midnight commander, a file browser and manager, were not backported to the current version of mc that Debian ships in their stable release. The Common Vulnerabilities and Exposures Project identifies the following vulnerabilities:
CVE-2004-1004: Multiple format string vulnerabilities CVE-2004-1005: Multiple buffer overflows
CVE-2004-1009: One infinite loop vulnerability
CVE-2004-1090: Denial of service via corrupted section header CVE-2004-1091: Denial of service via null dereference CVE-2004-1092: Freeing unallocated memory
CVE-2004-1093: Denial of service via use of already freed memory CVE-2004-1174: Denial of service via manipulating non-existing file handles CVE-2004-1175: Unintended program execution via insecure filename quoting CVE-2004-1176: Denial of service via a buffer underflow
For the stable distribution (woody) these problems have been fixed in version 4.5.55-1.2woody5
For the unstable distribution (sid) these problems should already be fixed since they were backported from current versions.
We recommend that you upgrade your mc package.
Severity
Classification
-
CVE CVE-2004-1004, CVE-2004-1005, CVE-2004-1009, CVE-2004-1090, CVE-2004-1091, CVE-2004-1092, CVE-2004-1093, CVE-2004-1174, CVE-2004-1175, CVE-2004-1176 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities