DSA-012-1 micq -- remote buffer overflow

Related Vulnerabilities: CVE-2001-0233  

PkC has reported that there is a buffer overflow in sprintf() in micq versions 0.4.6 and previous, that allows to a remote attacker able to sniff packets to the ICQ server to execute arbitrary code on the victim system. We recommend you upgrade your micq package immediately.

Debian Security Advisory

DSA-012-1 micq -- remote buffer overflow

Date Reported:
22 Jan 2001
Affected Packages:
micq
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 2254.
In Mitre's CVE dictionary: CVE-2001-0233.
More information:
PkC has reported that there is a buffer overflow in sprintf() in micq versions 0.4.6 and previous, that allows to a remote attacker able to sniff packets to the ICQ server to execute arbitrary code on the victim system.

We recommend you upgrade your micq package immediately.

Fixed in:

Debian 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/micq_0.4.3-4.dsc
http://security.debian.org/dists/stable/updates/main/source/micq_0.4.3.orig.tar.gz
http://security.debian.org/dists/stable/updates/main/source/micq_0.4.3-4.diff.gz
alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/micq_0.4.3-4_alpha.deb
arm:
http://security.debian.org/dists/stable/updates/main/binary-arm/micq_0.4.3-4_arm.deb
i386:
http://security.debian.org/dists/stable/updates/main/binary-i386/micq_0.4.3-4_i386.deb
m68k:
http://security.debian.org/dists/stable/updates/main/binary-m68k/micq_0.4.3-4_m68k.deb
powerpc:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/micq_0.4.3-4_powerpc.deb
sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/micq_0.4.3-4_sparc.deb