DSA-877-1 gnump3d -- cross-site scripting, directory traversal

Related Vulnerabilities: CVE-2005-3123   CVE-2005-3424   CVE-2005-3425   CVE-2005-3122  

Steve Kemp discovered two vulnerabilities in gnump3d, a streaming server for MP3 and OGG files. The Common Vulnerabilities and Exposures Project identifies the following problems: CVE-2005-3122 The 404 error page does not strip malicious javascript content from the resulting page, which would be executed in the victims browser. CVE-2005-3123 By using specially crafting URLs it is possible to read arbitrary files to which the user of the streaming server has access to. The old stable distribution (woody) does not contain a gnump3d package. For the stable distribution (sarge) these problems have been fixed in version 2.9.3-1sarge2. For the unstable distribution (sid) these problems have been fixed in version 2.9.6-1. We recommend that you upgrade your gnump3d package.

Debian Security Advisory

DSA-877-1 gnump3d -- cross-site scripting, directory traversal

Date Reported:
28 Oct 2005
Affected Packages:
gnump3d
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2005-3123, CVE-2005-3424, CVE-2005-3425.
More information:

Steve Kemp discovered two vulnerabilities in gnump3d, a streaming server for MP3 and OGG files. The Common Vulnerabilities and Exposures Project identifies the following problems:

  • CVE-2005-3122

    The 404 error page does not strip malicious javascript content from the resulting page, which would be executed in the victims browser.

  • CVE-2005-3123

    By using specially crafting URLs it is possible to read arbitrary files to which the user of the streaming server has access to.

The old stable distribution (woody) does not contain a gnump3d package.

For the stable distribution (sarge) these problems have been fixed in version 2.9.3-1sarge2.

For the unstable distribution (sid) these problems have been fixed in version 2.9.6-1.

We recommend that you upgrade your gnump3d package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/g/gnump3d/gnump3d_2.9.3-1sarge2.dsc
http://security.debian.org/pool/updates/main/g/gnump3d/gnump3d_2.9.3.orig.tar.gz
http://security.debian.org/pool/updates/main/g/gnump3d/gnump3d_2.9.3-1sarge2.diff.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/g/gnump3d/gnump3d_2.9.3-1sarge2_all.deb

MD5 checksums of the listed files are available in the original advisory.