Login
Newsletter
Werbung

Sicherheit: Überschreiben von Dateien in rp-pppoe
Aktuelle Meldungen Distributionen
Name: Überschreiben von Dateien in rp-pppoe
ID: MDKSA-2004:145
Distribution: Mandrake
Plattformen: Mandrake Multi Network Firewall 8.2, Mandrake Corporate Server 2.1, Mandrake 9.2, Mandrake 10.0, Mandrake 10.1
Datum: Mi, 8. Dezember 2004, 12:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0564
Applikationen: rp-pppoe

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: rp-pppoe
Advisory ID: MDKSA-2004:145
Date: December 6th, 2004

Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1,
Multi Network Firewall 8.2
______________________________________________________________________

Problem Description:

Max Vozeler discovered a vulnerability in pppoe, part of the rp-pppoe
package. When pppoe is running setuid root, an attacker can overwrite
any file on the system. Mandrakelinux does not install pppoe setuid
root, however the packages have been patched to prevent this problem.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0564
______________________________________________________________________

Updated Packages:

Mandrakelinux 10.0:
0e485ee8443f57b18ab629f53ff75518 10.0/RPMS/rp-pppoe-3.5-3.1.100mdk.i586.rpm
0bec0bb1083b159594bbd1f525d7d677
10.0/RPMS/rp-pppoe-gui-3.5-3.1.100mdk.i586.rpm
1c7993034cb99ef05f3242c887a8b155 10.0/SRPMS/rp-pppoe-3.5-3.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
150a55e440c43c8a684d39a459a5fa0a
amd64/10.0/RPMS/rp-pppoe-3.5-3.1.100mdk.amd64.rpm
eb5fdb187452a121dc88fc627715113a
amd64/10.0/RPMS/rp-pppoe-gui-3.5-3.1.100mdk.amd64.rpm
1c7993034cb99ef05f3242c887a8b155
amd64/10.0/SRPMS/rp-pppoe-3.5-3.1.100mdk.src.rpm

Mandrakelinux 10.1:
100d90b8ea25ff714a4fd3800f3b7bbf 10.1/RPMS/rp-pppoe-3.5-4.1.101mdk.i586.rpm
c249795e0c437f3578b9f3ab83d33d78
10.1/RPMS/rp-pppoe-gui-3.5-4.1.101mdk.i586.rpm
ae1e810107aa2c8c5dfca216634765fd 10.1/SRPMS/rp-pppoe-3.5-4.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
2cb2f26a1dbd9f43c558c0d4d66ae4f4
x86_64/10.1/RPMS/rp-pppoe-3.5-4.1.101mdk.x86_64.rpm
3d5f0f3faff6ba1f54052115ab874e2c
x86_64/10.1/RPMS/rp-pppoe-gui-3.5-4.1.101mdk.x86_64.rpm
ae1e810107aa2c8c5dfca216634765fd
x86_64/10.1/SRPMS/rp-pppoe-3.5-4.1.101mdk.src.rpm

Corporate Server 2.1:
f56f79c9a883a101ccc6496670af1e91
corporate/2.1/RPMS/rp-pppoe-3.5-1.1.C21mdk.i586.rpm
a5eaaad05db008190963f803f390b05f
corporate/2.1/RPMS/rp-pppoe-gui-3.5-1.1.C21mdk.i586.rpm
42cc82a8e8b6af877aa807c0476496bd
corporate/2.1/SRPMS/rp-pppoe-3.5-1.1.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
016c9eda79d4d3805ae796846085d4c6
x86_64/corporate/2.1/RPMS/rp-pppoe-3.5-1.1.C21mdk.x86_64.rpm
8642a8fcf2631e7bbba67eecd21bc1bc
x86_64/corporate/2.1/RPMS/rp-pppoe-gui-3.5-1.1.C21mdk.x86_64.rpm
42cc82a8e8b6af877aa807c0476496bd
x86_64/corporate/2.1/SRPMS/rp-pppoe-3.5-1.1.C21mdk.src.rpm

Mandrakelinux 9.2:
d745440cd787c14637521c8cf5188471 9.2/RPMS/rp-pppoe-3.5-3.1.92mdk.i586.rpm
52f63dcedbcab1c4b80834f83512ce70 9.2/RPMS/rp-pppoe-gui-3.5-3.1.92mdk.i586.rpm
2f03184db0df85eb6ba618a1360f781a 9.2/SRPMS/rp-pppoe-3.5-3.1.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
946b85cba1ea6780274d0d9ee9ecf91c
amd64/9.2/RPMS/rp-pppoe-3.5-3.1.92mdk.amd64.rpm
b6b4ced3a16da1799dfd0e0805bcadb6
amd64/9.2/RPMS/rp-pppoe-gui-3.5-3.1.92mdk.amd64.rpm
2f03184db0df85eb6ba618a1360f781a
amd64/9.2/SRPMS/rp-pppoe-3.5-3.1.92mdk.src.rpm

Multi Network Firewall 8.2:
daf4bf7d46a2fda22ed3299709923055 mnf8.2/RPMS/rp-pppoe-3.3-2.1.M82mdk.i586.rpm
e49e7dbbdd6f9b1a0db804fa61a21cd8
mnf8.2/RPMS/rp-pppoe-gui-3.3-2.1.M82mdk.i586.rpm
80ff456dbdacdde58d3e29c2634de34c mnf8.2/SRPMS/rp-pppoe-3.3-2.1.M82mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandrakesoft for security. You can obtain
the GPG public key of the Mandrakelinux Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandrakelinux at:

http://www.mandrakesoft.com/security/advisories

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBtRc8mqjQ0CJFipgRAkEIAKDh5MESdxZogfDaUFmT8rEv0GR1aQCg5h5x
rRrRkAgKYOjPhPsN/VKi7e4=
=z/5i
-----END PGP SIGNATURE-----


____________________________________________________
Want to buy your Pack or Services from MandrakeSoft?
Go to http://www.mandrakestore.com
Join the Club : http://www.mandrakeclub.com
____________________________________________________
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung