Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ucd-snmp
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ucd-snmp
ID: DSA-111-1
Distribution: Debian
Plattformen: Debian potato
Datum: Fr, 15. Februar 2002, 12:00
Referenzen: Keine Angabe
Applikationen: Net-SNMP

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----

------------------------------------------------------------------------
Debian Security Advisory DSA-111-1 security@debian.org
http://www.debian.org/security/ Wichert Akkerman
February 14, 2002
------------------------------------------------------------------------


Package : ucd-snmp
Problem type : remote exploit
Debian-specific: no
CERT Advisory : CA-2002-03

The Secure Programming Group of the Oulu University did a study on
SNMP implementations and uncovered multiple problems which can
cause problems ranging from Denial of Service attacks to remote
exploits.

New UCD-SNMP packages have been prepared to fix these problems
as well as a few others. The complete list of fixed problems is:

* When running external programs snmpd used temporary files insecurely
* snmpd did not properly reset supplementary groups after changing
its uid and gid
* Modified most code to use buffers instead of fixed-length strings to
prevent buffer overflows
* The ASN.1 parser did not check for negative lengths
* the IFINDEX response handling in snmpnetstat did not do a sanity check
on its input

(thanks to Caldera for most of the work on those patches)

The new version is 4.1.1-2.1 and we recommend you upgrade your
snmp packages immediately.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.


Debian GNU/Linux 2.2 alias potato
---------------------------------

Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

Source archives:
ucd-snmp_4.1.1-2.1.diff.gz
MD5 checksum: 96ef7f9946c3a10f100744fdc5482418
ucd-snmp_4.1.1-2.1.dsc
MD5 checksum: 03bc1ccf1a22e436a78c3e5a1ad4eefa
ucd-snmp_4.1.1.orig.tar.gz
MD5 checksum: 2f0d6130af510a8ce283dfdb557a85fa

Alpha architecture:
libsnmp4.1-dev_4.1.1-2.1_alpha.deb
MD5 checksum: e6cbb17f5295e4e663bee8369b2cf419
libsnmp4.1_4.1.1-2.1_alpha.deb
MD5 checksum: 31c67fca601af32915020f5ce67f74cf
snmp_4.1.1-2.1_alpha.deb
MD5 checksum: 0a82614ab42742528f9ebf13b8034410
snmpd_4.1.1-2.1_alpha.deb
MD5 checksum: 205ab169948ac4c54665adb8dcaa8a67

ARM architecture:
libsnmp4.1-dev_4.1.1-2.1_arm.deb
MD5 checksum: ce4597a66d4bb6a816a859f2792cc62b
libsnmp4.1_4.1.1-2.1_arm.deb
MD5 checksum: 9e96864263ab5f9489fcea655f1b0a50
snmp_4.1.1-2.1_arm.deb
MD5 checksum: 2c0361c50cf0f97a77439c0f9c834c17
snmpd_4.1.1-2.1_arm.deb
MD5 checksum: 48abd58e7399e245c3d3775ab59cbba3

Intel IA-32 architecture:
libsnmp4.1-dev_4.1.1-2.1_i386.deb
MD5 checksum: 5addf966bc067f943b4ca6c7d604a48f
libsnmp4.1_4.1.1-2.1_i386.deb
MD5 checksum: e1ebaeaee18859d1e58aae658e4b1564
snmp_4.1.1-2.1_i386.deb
MD5 checksum: 7d13633a4e8a922eb36d6bfe8a04f0f3
snmpd_4.1.1-2.1_i386.deb
MD5 checksum: bb63f353a4e3bba6d0bd3acc54f6a138

Motorola 680x0 architecture:
libsnmp4.1-dev_4.1.1-2.1_m68k.deb
MD5 checksum: 805cc411f0b7d425275f60ef238773a4
libsnmp4.1_4.1.1-2.1_m68k.deb
MD5 checksum: 021c14224b260e43276553329dc264f7
snmp_4.1.1-2.1_m68k.deb
MD5 checksum: 5a8c55d92c6b721f3e1487ba858eb6e2
snmpd_4.1.1-2.1_m68k.deb
MD5 checksum: 411834b9de92101366a7898f880d82eb

PowerPC architecture:
libsnmp4.1-dev_4.1.1-2.1_powerpc.deb
MD5 checksum: a7dde01a21e7258b45285924dafd6b70
libsnmp4.1_4.1.1-2.1_powerpc.deb
MD5 checksum: a0e037e1fcebb2154fa1f41c65dfb0a8
snmp_4.1.1-2.1_powerpc.deb
MD5 checksum: 4510c8dbc86d1acc1fd31a2625b9ebc3
snmpd_4.1.1-2.1_powerpc.deb
MD5 checksum: 81acd0406d0166539d1fa61214fe7b59

Sun Sparc architecture:
libsnmp4.1-dev_4.1.1-2.1_sparc.deb
MD5 checksum: 098021d71b64d77622aaaa4ff0a7502c
libsnmp4.1_4.1.1-2.1_sparc.deb
MD5 checksum: 1f5702918bfd3704abb82f72b4e9cfe8
snmp_4.1.1-2.1_sparc.deb
MD5 checksum: e52aad9099ff709e94820b2bbbfd0ee1
snmpd_4.1.1-2.1_sparc.deb
MD5 checksum: 813afcda0149f7a8c193b891320c14fa

These packages will be moved into the stable distribution on its next
revision.

--
----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBPGv+nKjZR/ntlUftAQEZMwL+ILCRSWoPRc8sEWtEA8RM6oYBhRBju7k1
CXRde/RR5/qVcCo83uG55W7oog8VhK4qrE76agXvNuCKIfo2EG1jYeonFw4rRffa
RvVWfd9mHFan0TL1hE0DS8++6N2oicYb
=WUPS
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung