drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme im NIS-Client
Name: |
Mehrere Probleme im NIS-Client
|
|
ID: |
CSSA-2000-039.0 |
|
Distribution: |
Caldera |
|
Plattformen: |
Caldera eDesktop 2.4, Caldera Desktop 2.3, Caldera eBuilder, Caldera eServer 2.3 |
|
Datum: |
Fr, 27. Oktober 2000, 13:00 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
ypbind-mt |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
______________________________________________________________________________ Caldera Systems, Inc. Security Advisory
Subject: security problems in ypbind Advisory number: CSSA-2000-039.0 Issue date: 2000 October, 27 Cross reference: ______________________________________________________________________________
1. Problem Description
There are several security problems in ypbind, the daemon used by NIS clients for binding to their NIS server(s). First, there is a potential buffer overflow; it is not clear whether it is possible to exploit it at all. Second, there is a denial of service attack against ypbind that can make it run out of file descriptors.
2. Vulnerable Versions
System Package ----------------------------------------------------------- OpenLinux Desktop 2.3 All packages previous to nis-2.0-12
OpenLinux eServer 2.3 All packages previous to and OpenLinux eBuilder nis-2.0-12
OpenLinux eDesktop 2.4 All packages previous to nis-2.0-12
3. Solution
Workaround:
none
4. OpenLinux Desktop 2.3
4.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS
4.2 Verification
475f1173b39d61be3bfefb616adc7d70 RPMS/nis-client-2.0-12.i386.rpm 2b843e611fa135fec1d1ab3eec32eafe RPMS/nis-server-2.0-12.i386.rpm c0fc63b43f7302da24119d8e7ac2bb7c SRPMS/nis-2.0-12.src.rpm
4.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fhv nis-*.i386.rpm
5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0
5.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS
5.2 Verification
dda1d3f8465c5a1e39f7274bd413c4e9 RPMS/nis-client-2.0-12.i386.rpm 2872d08157734973e37237ba10d7f87e RPMS/nis-server-2.0-12.i386.rpm c0fc63b43f7302da24119d8e7ac2bb7c SRPMS/nis-2.0-12.src.rpm
5.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fhv nis-*.i386.rpm
6. OpenLinux eDesktop 2.4
6.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS
6.2 Verification
41a67ed3b1508ecb959b7d72a42a7e7d RPMS/nis-client-2.0-12.i386.rpm 563902177d6abe1f446e264cbf127062 RPMS/nis-server-2.0-12.i386.rpm c0fc63b43f7302da24119d8e7ac2bb7c SRPMS/nis-2.0-12.src.rpm
6.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fhv nis-*.i386.rpm
7. References
This and other Caldera security resources are located at:
http://www.calderasystems.com/support/security/index.html
This security fix closes Caldera's internal Problem Report 8117.
8. Disclaimer
Caldera Systems, Inc. is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of Caldera OpenLinux.
______________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.1 (GNU/Linux) Comment: For info see http://www.gnupg.org
iD8DBQE5+WPt18sy83A/qfwRAovWAKCav9BVYHhUW8ETqlU0vjMYxiJ6wwCfSdhU 0rePyg1uak4C0HOTnXLXGC0= =rdWR -----END PGP SIGNATURE-----
|
|
|
|