Your message dated Wed, 19 Jan 2005 10:01:10 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#291183: CAN-2004-1378: Denial of service in jabberd
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 19 Jan 2005 09:27:55 +0000
>From [EMAIL PROTECTED] Wed Jan 19 01:27:54 2005
Return-path: <[EMAIL PROTECTED]>
Received: from luonnotar.infodrom.org [195.124.48.78] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CrC82-000862-00; Wed, 19 Jan 2005 01:27:54 -0800
Received: by luonnotar.infodrom.org (Postfix, from userid 10)
        id 81F5F366B9C; Wed, 19 Jan 2005 10:27:57 +0100 (CET)
Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2)
        from infodrom.org by finlandia.Infodrom.North.DE
        via smail from stdin
        id <[EMAIL PROTECTED]>
        for [EMAIL PROTECTED]; Wed, 19 Jan 2005 10:23:24 +0100 (CET) 
Date: Wed, 19 Jan 2005 10:23:24 +0100
From: Martin Schulze <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: CAN-2004-1378: Denial of service in jabberd
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: jabber
Version: 1.4.3-3
Severity: grave
Tags: security sid sarge

I can only guess that our version is vulnerable as well.  If not, please close
this bug report.  If you've included a fixe, please add the CVE id to the
proper changelog item.

======================================================
Candidate: CAN-2004-1378
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1378
Final-Decision:
Interim-Decision:
Modified:
Proposed:
Assigned: 20050119
Category: SF
Reference: BUGTRAQ:20040920 Possible DoS attack against jabberd 1.4.3 and 
jadc2s 0.9.0
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=109583829122679&w=2
Reference: MLIST:20040919 [jabberd] Jabberd 1.4 critical bug
Reference: 
URL:http://mail.jabber.org/pipermail/jabberd/2004-September/002004.html
Reference: CONFIRM:http://devel.amessage.info/jabberd14/
Reference: 
CONFIRM:http://www.vuxml.org/freebsd/2e25d38b-54d1-11d9-b612-000c6e8f12ef.html
Reference: GENTOO:GLSA-200409-31
Reference: URL:http://www.gentoo.org/security/en/glsa/glsa-200409-31.xml
Reference: BID:11231
Reference: URL:http://www.securityfocus.com/bid/11231
Reference: XF:jabberd-xml-dos(17466)
Reference: URL:http://xforce.iss.net/xforce/xfdb/17466

The expat XML parser code, as used in the open source Jabber (jabberd)
1.4.3 and earlier, jadc2s 0.9.0 and earlier, and possibly other
packages, allows remote attackers to cause a denial of service
(application crash) via a malformed packet to a socket that accepts
XML connnections.


Regards,

        Joey

-- 
Ten years and still binary compatible.  -- XFree86

Please always Cc to me when replying to me on the lists.

---------------------------------------
Received: (at 291183-done) by bugs.debian.org; 19 Jan 2005 17:01:14 +0000
>From [EMAIL PROTECTED] Wed Jan 19 09:01:14 2005
Return-path: <[EMAIL PROTECTED]>
Received: from h-67-101-186-172.dnvtco56.covad.net (forseti.asgardsrealm.net) 
[67.101.186.172] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CrJCk-0001QR-00; Wed, 19 Jan 2005 09:01:14 -0800
Received: from cerberus.asgardsrealm.net
        ([192.168.10.80] helo=cerberus ident=mail)
        by forseti.asgardsrealm.net with esmtp (Exim 4.34)
        id 1CrJCh-0007c0-Ok; Wed, 19 Jan 2005 10:01:11 -0700
Received: from jcollins by cerberus with local (Exim 3.36 #1 (Debian))
        id 1CrJCh-0002FD-00; Wed, 19 Jan 2005 10:01:11 -0700
Date: Wed, 19 Jan 2005 10:01:10 -0700
From: "Jamin W. Collins" <[EMAIL PROTECTED]>
To: Martin Schulze <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Subject: Re: Bug#291183: CAN-2004-1378: Denial of service in jabberd
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
User-Agent: Mutt/1.5.6+20040907i
Sender: "Jamin W. Collins" <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

On Wed, Jan 19, 2005 at 10:23:24AM +0100, Martin Schulze wrote:
> Package: jabber
> Version: 1.4.3-3
> Severity: grave
> Tags: security sid sarge
> 
> I can only guess that our version is vulnerable as well.

No, there are several things you could have done:
   - checked previous bug reports and changelog entries concerning expat
   - installed the Debian package and tested with the simple command
     found here:
      http://mail.jabber.org/pipermail/jabberd/2004-September/002004.html
   - checked the package source for inclusion of the patch

Any of the above would have indicated that the problem has been
corrected in the Debian packages.

> If not, please close this bug report.  

The problem was initially reported here:

   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=272408

The corrective patch has been included in the Debian package for a
while.

> If you've included a fixe, please add the CVE id to the
> proper changelog item.

Changing historical changelog entries isn't a good thing (IMHO).  

-- 
Jamin W. Collins

Linux is not The Answer. Yes is the answer. Linux is The Question. - Neo


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to