DSA-834-1 prozilla -- buffer overflow

Related Vulnerabilities: CVE-2005-2961  

Tavis Ormandy discovered a buffer overflow in prozilla, a multi-threaded download accelerator, which may be exploited to execute arbitrary code. For the old stable distribution (woody) this problem has been fixed in version 1.3.6-3woody3. The stable distribution (sarge) does not contain prozilla packages. The unstable distribution (sid) does not contain prozilla packages. We recommend that you upgrade your prozilla package.

Debian Security Advisory

DSA-834-1 prozilla -- buffer overflow

Date Reported:
01 Oct 2005
Affected Packages:
prozilla
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2005-2961.
More information:

Tavis Ormandy discovered a buffer overflow in prozilla, a multi-threaded download accelerator, which may be exploited to execute arbitrary code.

For the old stable distribution (woody) this problem has been fixed in version 1.3.6-3woody3.

The stable distribution (sarge) does not contain prozilla packages.

The unstable distribution (sid) does not contain prozilla packages.

We recommend that you upgrade your prozilla package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3.dsc
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3.diff.gz
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6-3woody3_sparc.deb

MD5 checksums of the listed files are available in the original advisory.