CVE-2007-5226 remote denial of service

Related Vulnerabilities: CVE-2007-5226  

Debian Bug report logs - #445883
CVE-2007-5226 remote denial of service

version graph

Reported by: Nico Golde <nion@debian.org>

Date: Mon, 8 Oct 2007 21:57:02 UTC

Severity: grave

Tags: patch, security

Found in version dircproxy/1.0.5-3

Fixed in versions dircproxy/1.0.5-5.1, dircproxy/1.0.5-5etch4

Done: Martin Zobel-Helas <zobel@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Alex Pennace <alex@pennace.org>:
Bug#445883; Package dircproxy. (full text, mbox, link).


Acknowledgement sent to Nico Golde <nion@debian.org>:
New Bug report received and forwarded. Copy sent to Alex Pennace <alex@pennace.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: submit@bugs.debian.org
Subject: CVE-2007-5226 remote denial of service
Date: Mon, 8 Oct 2007 23:55:20 +0200
[Message part 1 (text/plain, inline)]
Package: dircproxy
Version: 1.0.5-3
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for dircproxy.

CVE-2007-5226[0]:
| irc_server.c in dircproxy 1.2.0 and earlier allows remote attackers to
| cause a denial of service (segmentation fault) via an ACTION command
| without a parameter, which triggers a NULL pointer dereference, as
| demonstrated using a blank /me message from irssi.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

The null pointer dereference itself is not that big kind of 
a problem here but since this also means to lose the data 
you want to read while you are away I mark this as grave.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5226

Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
[Message part 2 (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Alex Pennace <alex@pennace.org>:
Bug#445883; Package dircproxy. (full text, mbox, link).


Acknowledgement sent to Steffen Joeris <steffen.joeris@skolelinux.de>:
Extra info received and forwarded to list. Copy sent to Alex Pennace <alex@pennace.org>. (full text, mbox, link).


Message #10 received at 445883@bugs.debian.org (full text, mbox, reply):

From: Steffen Joeris <steffen.joeris@skolelinux.de>
To: control@bugs.debian.org
Cc: 445883@bugs.debian.org
Subject: NMU patch
Date: Tue, 9 Oct 2007 19:38:07 +1000
[Message part 1 (text/plain, inline)]
tags 445883 patch
thanks

Hi

Attached you will find the NMU patch for the bug, which I just uploaded to 
unstable.

Cheers
Steffen
[nmu.patch (text/x-diff, attachment)]
[signature.asc (application/pgp-signature, inline)]

Tags added: patch Request was from Steffen Joeris <steffen.joeris@skolelinux.de> to control@bugs.debian.org. (Tue, 09 Oct 2007 09:33:14 GMT) (full text, mbox, link).


Reply sent to Steffen Joeris <white@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Nico Golde <nion@debian.org>:
Bug acknowledged by developer. (full text, mbox, link).


Message #17 received at 445883-close@bugs.debian.org (full text, mbox, reply):

From: Steffen Joeris <white@debian.org>
To: 445883-close@bugs.debian.org
Subject: Bug#445883: fixed in dircproxy 1.0.5-5.1
Date: Tue, 09 Oct 2007 09:47:03 +0000
Source: dircproxy
Source-Version: 1.0.5-5.1

We believe that the bug you reported is fixed in the latest version of
dircproxy, which is due to be installed in the Debian FTP archive:

dircproxy_1.0.5-5.1.diff.gz
  to pool/main/d/dircproxy/dircproxy_1.0.5-5.1.diff.gz
dircproxy_1.0.5-5.1.dsc
  to pool/main/d/dircproxy/dircproxy_1.0.5-5.1.dsc
dircproxy_1.0.5-5.1_i386.deb
  to pool/main/d/dircproxy/dircproxy_1.0.5-5.1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 445883@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steffen Joeris <white@debian.org> (supplier of updated dircproxy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 09 Oct 2007 07:36:49 +0000
Source: dircproxy
Binary: dircproxy
Architecture: source i386
Version: 1.0.5-5.1
Distribution: unstable
Urgency: high
Maintainer: Alex Pennace <alex@pennace.org>
Changed-By: Steffen Joeris <white@debian.org>
Description: 
 dircproxy  - IRC proxy for people who use IRC from different workstations
Closes: 445883
Changes: 
 dircproxy (1.0.5-5.1) unstable; urgency=high
 .
   * Non-maintainer upload by the testing-security team
   * Backport upstream patch to fix a NULL pointer reference, which
     can lead to a DoS (Closes: #445883)
     Fixes: CVE-2007-5226
Files: 
 25b170bba4d32548179d2614b617b950 572 net optional dircproxy_1.0.5-5.1.dsc
 b8887104091b64b7a02fd0e56e4f4248 14619 net optional dircproxy_1.0.5-5.1.diff.gz
 be66ed9d95c1b1a9d0670269f00fd503 117210 net optional dircproxy_1.0.5-5.1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHC0th62zWxYk/rQcRAoG7AJsGiI1KRhqBXWYxCwNY2KRD6iwKwgCfaHj7
33yIS7JxYGgKpAJq2cw0/c8=
=2dEe
-----END PGP SIGNATURE-----





Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#445883; Package dircproxy. (full text, mbox, link).


Acknowledgement sent to Alex Pennace <alex@pennace.org>:
Extra info received and forwarded to list. (full text, mbox, link).


Message #22 received at 445883@bugs.debian.org (full text, mbox, reply):

From: Alex Pennace <alex@pennace.org>
To: Nico Golde <nion@debian.org>, 445883@bugs.debian.org, white@debian.org
Cc: team@security.debian.org
Subject: Re: Bug#445883: CVE-2007-5226 remote denial of service
Date: Tue, 9 Oct 2007 10:04:04 -0400
On Mon, Oct 08, 2007 at 11:55:20PM +0200, Nico Golde wrote:
> Hi,
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for dircproxy.
> 
> CVE-2007-5226[0]:
> | irc_server.c in dircproxy 1.2.0 and earlier allows remote attackers to
> | cause a denial of service (segmentation fault) via an ACTION command
> | without a parameter, which triggers a NULL pointer dereference, as
> | demonstrated using a blank /me message from irssi.
> 
> If you fix this vulnerability please also include the CVE id
> in your changelog entry.
> 
> The null pointer dereference itself is not that big kind of 
> a problem here but since this also means to lose the data 
> you want to read while you are away I mark this as grave.

Thanks Nico and Steffen.

Security team: this bug is also present in stable and oldstable.




Information forwarded to debian-bugs-dist@lists.debian.org, Alex Pennace <alex@pennace.org>:
Bug#445883; Package dircproxy. (full text, mbox, link).


Acknowledgement sent to Moritz Muehlenhoff <jmm@inutil.org>:
Extra info received and forwarded to list. Copy sent to Alex Pennace <alex@pennace.org>. (full text, mbox, link).


Message #27 received at 445883@bugs.debian.org (full text, mbox, reply):

From: Moritz Muehlenhoff <jmm@inutil.org>
To: Alex Pennace <alex@pennace.org>
Cc: Nico Golde <nion@debian.org>, 445883@bugs.debian.org, white@debian.org, team@security.debian.org
Subject: Re: Bug#445883: CVE-2007-5226 remote denial of service
Date: Tue, 9 Oct 2007 22:43:01 +0200
On Tue, Oct 09, 2007 at 10:04:04AM -0400, Alex Pennace wrote:
> On Mon, Oct 08, 2007 at 11:55:20PM +0200, Nico Golde wrote:
> > Hi,
> > the following CVE (Common Vulnerabilities & Exposures) id was
> > published for dircproxy.
> > 
> > CVE-2007-5226[0]:
> > | irc_server.c in dircproxy 1.2.0 and earlier allows remote attackers to
> > | cause a denial of service (segmentation fault) via an ACTION command
> > | without a parameter, which triggers a NULL pointer dereference, as
> > | demonstrated using a blank /me message from irssi.
> > 
> > If you fix this vulnerability please also include the CVE id
> > in your changelog entry.
> > 
> > The null pointer dereference itself is not that big kind of 
> > a problem here but since this also means to lose the data 
> > you want to read while you are away I mark this as grave.
> 
> Thanks Nico and Steffen.
> 
> Security team: this bug is also present in stable and oldstable.

I don't think this warrants a DSA, feel free to fix it through a
stable point release.

Cheers,
        Moritz




Reply sent to Martin Zobel-Helas <zobel@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Nico Golde <nion@debian.org>:
Bug acknowledged by developer. (full text, mbox, link).


Message #32 received at 445883-close@bugs.debian.org (full text, mbox, reply):

From: Martin Zobel-Helas <zobel@debian.org>
To: 445883-close@bugs.debian.org
Subject: Bug#445883: fixed in dircproxy 1.0.5-5etch4
Date: Thu, 24 Jan 2008 19:52:20 +0000
Source: dircproxy
Source-Version: 1.0.5-5etch4

We believe that the bug you reported is fixed in the latest version of
dircproxy, which is due to be installed in the Debian FTP archive:

dircproxy_1.0.5-5etch4.diff.gz
  to pool/main/d/dircproxy/dircproxy_1.0.5-5etch4.diff.gz
dircproxy_1.0.5-5etch4.dsc
  to pool/main/d/dircproxy/dircproxy_1.0.5-5etch4.dsc
dircproxy_1.0.5-5etch4_i386.deb
  to pool/main/d/dircproxy/dircproxy_1.0.5-5etch4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 445883@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Martin Zobel-Helas <zobel@debian.org> (supplier of updated dircproxy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 24 Jan 2008 09:11:16 +0100
Source: dircproxy
Binary: dircproxy
Architecture: source i386
Version: 1.0.5-5etch4
Distribution: stable
Urgency: low
Maintainer: Alex Pennace <alex@pennace.org>
Changed-By: Martin Zobel-Helas <zobel@debian.org>
Description: 
 dircproxy  - IRC proxy for people who use IRC from different workstations
Closes: 445883
Changes: 
 dircproxy (1.0.5-5etch4) stable; urgency=low
 .
   * Non-maintainer upload by SRM
   * Backport upstream patch to fix a NULL pointer reference, which
     can lead to a DoS (Closes: #445883)
     Fixes: CVE-2007-5226
Files: 
 567a30ce73ab51456c9c561717f9fbb7 578 net optional dircproxy_1.0.5-5etch4.dsc
 458702fb8f57d35ed431762ebf6f9986 14786 net optional dircproxy_1.0.5-5etch4.diff.gz
 ad5041f7ffbf4bacf7be31f24ac6a5f1 121220 net optional dircproxy_1.0.5-5etch4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHmEktST77jl1k+HARAn+uAKDnwEU+Xx5fKwF8RYSFVPN7CP+zwQCgpwZW
nBWwilZu1hB6SGzzzwZF3x0=
=LIs5
-----END PGP SIGNATURE-----





Reply sent to Martin Zobel-Helas <zobel@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Nico Golde <nion@debian.org>:
Bug acknowledged by developer. (full text, mbox, link).


Message #37 received at 445883-close@bugs.debian.org (full text, mbox, reply):

From: Martin Zobel-Helas <zobel@debian.org>
To: 445883-close@bugs.debian.org
Subject: Bug#445883: fixed in dircproxy 1.0.5-5etch4
Date: Sat, 16 Feb 2008 12:17:04 +0000
Source: dircproxy
Source-Version: 1.0.5-5etch4

We believe that the bug you reported is fixed in the latest version of
dircproxy, which is due to be installed in the Debian FTP archive:

dircproxy_1.0.5-5etch4.diff.gz
  to pool/main/d/dircproxy/dircproxy_1.0.5-5etch4.diff.gz
dircproxy_1.0.5-5etch4.dsc
  to pool/main/d/dircproxy/dircproxy_1.0.5-5etch4.dsc
dircproxy_1.0.5-5etch4_i386.deb
  to pool/main/d/dircproxy/dircproxy_1.0.5-5etch4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 445883@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Martin Zobel-Helas <zobel@debian.org> (supplier of updated dircproxy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 24 Jan 2008 09:11:16 +0100
Source: dircproxy
Binary: dircproxy
Architecture: source i386
Version: 1.0.5-5etch4
Distribution: stable
Urgency: low
Maintainer: Alex Pennace <alex@pennace.org>
Changed-By: Martin Zobel-Helas <zobel@debian.org>
Description: 
 dircproxy  - IRC proxy for people who use IRC from different workstations
Closes: 445883
Changes: 
 dircproxy (1.0.5-5etch4) stable; urgency=low
 .
   * Non-maintainer upload by SRM
   * Backport upstream patch to fix a NULL pointer reference, which
     can lead to a DoS (Closes: #445883)
     Fixes: CVE-2007-5226
Files: 
 567a30ce73ab51456c9c561717f9fbb7 578 net optional dircproxy_1.0.5-5etch4.dsc
 458702fb8f57d35ed431762ebf6f9986 14786 net optional dircproxy_1.0.5-5etch4.diff.gz
 ad5041f7ffbf4bacf7be31f24ac6a5f1 121220 net optional dircproxy_1.0.5-5etch4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHmEktST77jl1k+HARAn+uAKDnwEU+Xx5fKwF8RYSFVPN7CP+zwQCgpwZW
nBWwilZu1hB6SGzzzwZF3x0=
=LIs5
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 16 Mar 2008 07:35:00 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 19:05:48 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.