Debian alert: Multiple SNMP vulnerabilities
-----BEGIN PGP SIGNED MESSAGE----- - ------------------------------------------------------------------------ Debian Security Advisory DSA-111-1 security@debian.org http://www.debian.org/security/ Wichert Akkerman February 14, 2002 - ------------------------------------------------------------------------ Package : ucd-snmp Problem type : remote exploit Debian-specific: no CERT Advisory : CA-2002-03 The Secure Programming Group of the Oulu University did a study on SNMP implementations and uncovered multiple problems which can cause problems ranging from Denial of Service attacks to remote exploits. New UCD-SNMP packages have been prepared to fix these problems as well as a few others. The complete list of fixed problems is: * When running external programs snmpd used temporary files insecurely * snmpd did not properly reset supplementary groups after changing its uid and gid * Modified most code to use buffers instead of fixed-length strings to prevent buffer overflows * The ASN.1 parser did not check for negative lengths * the IFINDEX response handling in snmpnetstat did not do a sanity check on its input (thanks to Caldera for most of the work on those patches) The new version is 4.1.1-2.1 and we recommend you upgrade your snmp packages immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.2 alias potato - --------------------------------- Potato was released for alpha, arm, i386, m68k, powerpc and sparc. Source archives: http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1-2.1.diff.gz MD5 checksum: 96ef7f9946c3a10f100744fdc5482418 http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1-2.1.dsc MD5 checksum: 03bc1ccf1a22e436a78c3e5a1ad4eefa http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1.orig.tar.gz MD5 checksum: 2f0d6130af510a8ce283dfdb557a85fa Alpha architecture: http://security.debian.org/dists/stable/updates/main/binary-alpha/libsnmp4.1-dev_4.1.1-2.1_alpha.deb MD5 checksum: e6cbb17f5295e4e663bee8369b2cf419 http://security.debian.org/dists/stable/updates/main/binary-alpha/libsnmp4.1_4.1.1-2.1_alpha.deb MD5 checksum: 31c67fca601af32915020f5ce67f74cf http://security.debian.org/dists/stable/updates/main/binary-alpha/snmp_4.1.1-2.1_alpha.deb MD5 checksum: 0a82614ab42742528f9ebf13b8034410 http://security.debian.org/dists/stable/updates/main/binary-alpha/snmpd_4.1.1-2.1_alpha.deb MD5 checksum: 205ab169948ac4c54665adb8dcaa8a67 ARM architecture: http://security.debian.org/dists/stable/updates/main/binary-arm/libsnmp4.1-dev_4.1.1-2.1_arm.deb MD5 checksum: ce4597a66d4bb6a816a859f2792cc62b http://security.debian.org/dists/stable/updates/main/binary-arm/libsnmp4.1_4.1.1-2.1_arm.deb MD5 checksum: 9e96864263ab5f9489fcea655f1b0a50 http://security.debian.org/dists/stable/updates/main/binary-arm/snmp_4.1.1-2.1_arm.deb MD5 checksum: 2c0361c50cf0f97a77439c0f9c834c17 http://security.debian.org/dists/stable/updates/main/binary-arm/snmpd_4.1.1-2.1_arm.deb MD5 checksum: 48abd58e7399e245c3d3775ab59cbba3 Intel IA-32 architecture: http://security.debian.org/dists/stable/updates/main/binary-i386/libsnmp4.1-dev_4.1.1-2.1_i386.deb MD5 checksum: 5addf966bc067f943b4ca6c7d604a48f http://security.debian.org/dists/stable/updates/main/binary-i386/libsnmp4.1_4.1.1-2.1_i386.deb MD5 checksum: e1ebaeaee18859d1e58aae658e4b1564 http://security.debian.org/dists/stable/updates/main/binary-i386/snmp_4.1.1-2.1_i386.deb MD5 checksum: 7d13633a4e8a922eb36d6bfe8a04f0f3 http://security.debian.org/dists/stable/updates/main/binary-i386/snmpd_4.1.1-2.1_i386.deb MD5 checksum: bb63f353a4e3bba6d0bd3acc54f6a138 Motorola 680x0 architecture: http://security.debian.org/dists/stable/updates/main/binary-m68k/libsnmp4.1-dev_4.1.1-2.1_m68k.deb MD5 checksum: 805cc411f0b7d425275f60ef238773a4 http://security.debian.org/dists/stable/updates/main/binary-m68k/libsnmp4.1_4.1.1-2.1_m68k.deb MD5 checksum: 021c14224b260e43276553329dc264f7 http://security.debian.org/dists/stable/updates/main/binary-m68k/snmp_4.1.1-2.1_m68k.deb MD5 checksum: 5a8c55d92c6b721f3e1487ba858eb6e2 http://security.debian.org/dists/stable/updates/main/binary-m68k/snmpd_4.1.1-2.1_m68k.deb MD5 checksum: 411834b9de92101366a7898f880d82eb PowerPC architecture: http://security.debian.org/dists/stable/updates/main/binary-powerpc/libsnmp4.1-dev_4.1.1-2.1_powerpc.deb MD5 checksum: a7dde01a21e7258b45285924dafd6b70 http://security.debian.org/dists/stable/updates/main/binary-powerpc/libsnmp4.1_4.1.1-2.1_powerpc.deb MD5 checksum: a0e037e1fcebb2154fa1f41c65dfb0a8 http://security.debian.org/dists/stable/updates/main/binary-powerpc/snmp_4.1.1-2.1_powerpc.deb MD5 checksum: 4510c8dbc86d1acc1fd31a2625b9ebc3 http://security.debian.org/dists/stable/updates/main/binary-powerpc/snmpd_4.1.1-2.1_powerpc.deb MD5 checksum: 81acd0406d0166539d1fa61214fe7b59 Sun Sparc architecture: http://security.debian.org/dists/stable/updates/main/binary-sparc/libsnmp4.1-dev_4.1.1-2.1_sparc.deb MD5 checksum: 098021d71b64d77622aaaa4ff0a7502c http://security.debian.org/dists/stable/updates/main/binary-sparc/libsnmp4.1_4.1.1-2.1_sparc.deb MD5 checksum: 1f5702918bfd3704abb82f72b4e9cfe8 http://security.debian.org/dists/stable/updates/main/binary-sparc/snmp_4.1.1-2.1_sparc.deb MD5 checksum: e52aad9099ff709e94820b2bbbfd0ee1 http://security.debian.org/dists/stable/updates/main/binary-sparc/snmpd_4.1.1-2.1_sparc.deb MD5 checksum: 813afcda0149f7a8c193b891320c14fa These packages will be moved into the stable distribution on its next revision. - -- - ---------------------------------------------------------------------------- apt-get: deb http://security.debian.org/ stable/updates main dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQB1AwUBPGv+nKjZR/ntlUftAQEZMwL+ILCRSWoPRc8sEWtEA8RM6oYBhRBju7k1 CXRde/RR5/qVcCo83uG55W7oog8VhK4qrE76agXvNuCKIfo2EG1jYeonFw4rRffa RvVWfd9mHFan0TL1hE0DS8++6N2oicYb =WUPS -----END PGP SIGNATURE----- |
|
This topic does not have any threads posted yet!
You cannot post until you login.