Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Net-SNMP
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Net-SNMP
ID: MDVSA-2015:229
Distribution: Mandriva
Plattformen: Mandriva Business Server 1.0, Mandriva Business Server 2.0
Datum: Mi, 6. Mai 2015, 16:20
Referenzen: http://advisories.mageia.org/MGASA-2015-0187.html

Originalnachricht

This is a multi-part message in MIME format...

------------=_1430913629-6622-2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2015:229
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : net-snmp
Date : May 6, 2015
Affected: Business Server 1.0, Business Server 2.0
_______________________________________________________________________

Problem Description:

Updated net-snmp packages fix security vulnerability:

It was discovered that the snmp_pdu_parse() function could leave
incompletely parsed varBind variables in the list of variables. A
remote, unauthenticated attacker could exploit this flaw to cause a
crash or, potentially, execute arbitrary code.
_______________________________________________________________________

References:

http://advisories.mageia.org/MGASA-2015-0187.html
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 1/X86_64:
e9e6514a37583dcd8caf948a2975ee5d
mbs1/x86_64/lib64net-snmp30-5.7.2-1.3.mbs1.x86_64.rpm
d58a677b3359c3b9f2a6221bc71a4093
mbs1/x86_64/lib64net-snmp-devel-5.7.2-1.3.mbs1.x86_64.rpm
506af7ceaea330ac9e6009e51f91a23e
mbs1/x86_64/lib64net-snmp-static-devel-5.7.2-1.3.mbs1.x86_64.rpm
12b87dc4dbd4f7eac59ee150eeb7be3d
mbs1/x86_64/net-snmp-5.7.2-1.3.mbs1.x86_64.rpm
692233b0f7738441cee192c23917fc3f
mbs1/x86_64/net-snmp-mibs-5.7.2-1.3.mbs1.x86_64.rpm
5cb8de6d94a82083dec56b3c5fadf18f
mbs1/x86_64/net-snmp-tkmib-5.7.2-1.3.mbs1.x86_64.rpm
4d5d1e31fe98a83a25aca06779741426
mbs1/x86_64/net-snmp-trapd-5.7.2-1.3.mbs1.x86_64.rpm
164283a0c2fc778853e04a0d96d85193
mbs1/x86_64/net-snmp-utils-5.7.2-1.3.mbs1.x86_64.rpm
76ff7eeefb6243ba23019170d5869a1f
mbs1/x86_64/perl-NetSNMP-5.7.2-1.3.mbs1.x86_64.rpm
7985facf83ea1000bee08b4904ab59ac
mbs1/x86_64/python-netsnmp-5.7.2-1.3.mbs1.x86_64.rpm
a9426c006bb7dba9befa25a6f175848b mbs1/SRPMS/net-snmp-5.7.2-1.3.mbs1.src.rpm

Mandriva Business Server 2/X86_64:
96933cae4f472807871a938057737901
mbs2/x86_64/lib64net-snmp30-5.7.2-14.2.mbs2.x86_64.rpm
43a621e48ec1a90f9d19d2e5c41b441a
mbs2/x86_64/lib64net-snmp-devel-5.7.2-14.2.mbs2.x86_64.rpm
eb85a240ee2fdaf0e18186af60364527
mbs2/x86_64/lib64net-snmp-static-devel-5.7.2-14.2.mbs2.x86_64.rpm
29293d70a79ac2c2f2d3b7498795d9df
mbs2/x86_64/net-snmp-5.7.2-14.2.mbs2.x86_64.rpm
fb1d4d5cf0bd8bcd8507a9504f3cb1f7
mbs2/x86_64/net-snmp-mibs-5.7.2-14.2.mbs2.x86_64.rpm
84907f5a327dca8f65cfdbde383cf313
mbs2/x86_64/net-snmp-tkmib-5.7.2-14.2.mbs2.x86_64.rpm
2645307f112b55f39cdce0770f2c4f1d
mbs2/x86_64/net-snmp-trapd-5.7.2-14.2.mbs2.x86_64.rpm
324e814089995d267057def7ac9ffffc
mbs2/x86_64/net-snmp-utils-5.7.2-14.2.mbs2.x86_64.rpm
5f67cdc5934f817c00905d30d7c6f04e
mbs2/x86_64/perl-NetSNMP-5.7.2-14.2.mbs2.x86_64.rpm
f6e73d5addff4491699759064e01d1a4
mbs2/x86_64/python-netsnmp-5.7.2-14.2.mbs2.x86_64.rpm
fa0385f2c4a1ef79f753a1d6cf53292e mbs2/SRPMS/net-snmp-5.7.2-14.2.mbs2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVSfMpmqjQ0CJFipgRArE1AJ4wvx00/5uBh9Ha4ELG3dvic2uD+QCeIr/x
s5NKq7ytMV+Uhun8ldx8iIA=
=jYup
-----END PGP SIGNATURE-----


------------=_1430913629-6622-2
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1430913629-6622-2--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung