DSA-1597-2 mt-daapd -- multiple vulnerabilities

Related Vulnerabilities: CVE-2007-5824   CVE-2007-5825   CVE-2008-1771  

Three vulnerabilities have been discovered in the mt-daapd DAAP audio server (also known as the Firefly Media Server). The Common Vulnerabilities and Exposures project identifies the following three problems: CVE-2007-5824 Insufficient validation and bounds checking of the Authorization: HTTP header enables a heap buffer overflow, potentially enabling the execution of arbitrary code. CVE-2007-5825 Format string vulnerabilities in debug logging within the authentication of XML-RPC requests could enable the execution of arbitrary code. CVE-2008-1771 An integer overflow weakness in the handling of HTTP POST variables could allow a heap buffer overflow and potentially arbitrary code execution. For the stable distribution (etch), these problems have been fixed in version 0.2.4+r1376-1.1+etch2. For the unstable distribution (sid), these problems have been fixed in version 0.9~r1696-1.4. We recommend that you upgrade your mt-daapd package.

Debian Security Advisory

DSA-1597-2 mt-daapd -- multiple vulnerabilities

Date Reported:
12 Jun 2008
Affected Packages:
mt-daapd
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 459961, Bug 476241.
In Mitre's CVE dictionary: CVE-2007-5824, CVE-2007-5825, CVE-2008-1771.
More information:

Three vulnerabilities have been discovered in the mt-daapd DAAP audio server (also known as the Firefly Media Server). The Common Vulnerabilities and Exposures project identifies the following three problems:

  • CVE-2007-5824

    Insufficient validation and bounds checking of the Authorization: HTTP header enables a heap buffer overflow, potentially enabling the execution of arbitrary code.

  • CVE-2007-5825

    Format string vulnerabilities in debug logging within the authentication of XML-RPC requests could enable the execution of arbitrary code.

  • CVE-2008-1771

    An integer overflow weakness in the handling of HTTP POST variables could allow a heap buffer overflow and potentially arbitrary code execution.

For the stable distribution (etch), these problems have been fixed in version 0.2.4+r1376-1.1+etch4.

For the unstable distribution (sid), these problems have been fixed in version 0.9~r1696-1.4.

We recommend that you upgrade your mt-daapd package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4.dsc
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4.diff.gz
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4_ia64.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/m/mt-daapd/mt-daapd_0.2.4+r1376-1.1+etch4_sparc.deb

MD5 checksums of the listed files are available in the original advisory.