DSA-2369-1 libsoup2.4 -- insufficient input sanitization

Related Vulnerabilities: CVE-2011-2524  

It was discovered that libsoup, a HTTP library implementation in C, is not properly validating input when processing requests made to SoupServer. A remote attacker can exploit this flaw to access system files via a directory traversal attack. For the oldstable distribution (lenny), this problem has been fixed in version 2.4.1-2+lenny1. For the stable distribution (squeeze), this problem has been fixed in version 2.30.2-1+squeeze1. For the testing distribution (wheezy), this problem has been fixed in version 2.34.3-1. For the unstable distribution (sid), this problem has been fixed in version 2.34.3-1. We recommend that you upgrade your libsoup2.4 packages.

Debian Security Advisory

DSA-2369-1 libsoup2.4 -- insufficient input sanitization

Date Reported:
21 Dec 2011
Affected Packages:
libsoup2.4
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 635837.
In Mitre's CVE dictionary: CVE-2011-2524.
More information:

It was discovered that libsoup, a HTTP library implementation in C, is not properly validating input when processing requests made to SoupServer. A remote attacker can exploit this flaw to access system files via a directory traversal attack.

For the oldstable distribution (lenny), this problem has been fixed in version 2.4.1-2+lenny1.

For the stable distribution (squeeze), this problem has been fixed in version 2.30.2-1+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in version 2.34.3-1.

For the unstable distribution (sid), this problem has been fixed in version 2.34.3-1.

We recommend that you upgrade your libsoup2.4 packages.