DSA-1328-1 unicon-imc2 -- buffer overflow

Related Vulnerabilities: CVE-2007-2835  

Steve Kemp from the Debian Security Audit project discovered that unicon-imc2, a Chinese input method library, makes unsafe use of an environmental variable, which may be exploited to execute arbitrary code. For the stable distribution (etch) this problem has been fixed in version 3.0.4-11etch1. For the unstable distribution (sid) this problem will be fixed shortly. We recommend that you upgrade your unicon-imc2 package.

Debian Security Advisory

DSA-1328-1 unicon-imc2 -- buffer overflow

Date Reported:
01 Jul 2007
Affected Packages:
unicon-imc2
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2007-2835.
More information:

Steve Kemp from the Debian Security Audit project discovered that unicon-imc2, a Chinese input method library, makes unsafe use of an environmental variable, which may be exploited to execute arbitrary code.

For the stable distribution (etch) this problem has been fixed in version 3.0.4-11etch4.

For the unstable distribution (sid) this problem will be fixed shortly.

We recommend that you upgrade your unicon-imc2 package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch4.diff.gz
http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4.orig.tar.gz
http://security.debian.org/pool/updates/main/u/unicon/unicon_3.0.4-11etch4.dsc
Alpha:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch4_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch4_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch4_arm.deb
HPPA:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch4_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch4_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch4_ia64.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch4_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/u/unicon/unicon-imc2_3.0.4-11etch4_sparc.deb

MD5 checksums of the listed files are available in the original advisory.