--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
- ------------------------------------------------------------------------
Debian Security Advisory DSA-111-1 security@debian.org
http://www.debian.org/security/ Wichert Akkerman
February 14, 2002
- ------------------------------------------------------------------------
Package : ucd-snmp
Problem type : remote exploit
Debian-specific: no
CERT Advisory : CA-2002-03
The Secure Programming Group of the Oulu University did a study on
SNMP implementations and uncovered multiple problems which can
cause problems ranging from Denial of Service attacks to remote
exploits.
New UCD-SNMP packages have been prepared to fix these problems
as well as a few others. The complete list of fixed problems is:
* When running external programs snmpd used temporary files insecurely
* snmpd did not properly reset supplementary groups after changing
its uid and gid
* Modified most code to use buffers instead of fixed-length strings to
prevent buffer overflows
* The ASN.1 parser did not check for negative lengths
* the IFINDEX response handling in snmpnetstat did not do a sanity check
on its input
(thanks to Caldera for most of the work on those patches)
The new version is 4.1.1-2.1 and we recommend you upgrade your
snmp packages immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Debian GNU/Linux 2.2 alias potato
- ---------------------------------
Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
Source archives:
http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1-2.1.diff.gz
MD5 checksum: 96ef7f9946c3a10f100744fdc5482418
http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1-2.1.dsc
MD5 checksum: 03bc1ccf1a22e436a78c3e5a1ad4eefa
http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1.orig.tar.gz
MD5 checksum: 2f0d6130af510a8ce283dfdb557a85fa
Alpha architecture:
http://security.debian.org/dists/stable/updates/main/binary-alpha/libsnmp4.1-dev_4.1.1-2.1_alpha.deb
MD5 checksum: e6cbb17f5295e4e663bee8369b2cf419
http://security.debian.org/dists/stable/updates/main/binary-alpha/libsnmp4.1_4.1.1-2.1_alpha.deb
MD5 checksum: 31c67fca601af32915020f5ce67f74cf
http://security.debian.org/dists/stable/updates/main/binary-alpha/snmp_4.1.1-2.1_alpha.deb
MD5 checksum: 0a82614ab42742528f9ebf13b8034410
http://security.debian.org/dists/stable/updates/main/binary-alpha/snmpd_4.1.1-2.1_alpha.deb
MD5 checksum: 205ab169948ac4c54665adb8dcaa8a67
ARM architecture:
http://security.debian.org/dists/stable/updates/main/binary-arm/libsnmp4.1-dev_4.1.1-2.1_arm.deb
MD5 checksum: ce4597a66d4bb6a816a859f2792cc62b
http://security.debian.org/dists/stable/updates/main/binary-arm/libsnmp4.1_4.1.1-2.1_arm.deb
MD5 checksum: 9e96864263ab5f9489fcea655f1b0a50
http://security.debian.org/dists/stable/updates/main/binary-arm/snmp_4.1.1-2.1_arm.deb
MD5 checksum: 2c0361c50cf0f97a77439c0f9c834c17
http://security.debian.org/dists/stable/updates/main/binary-arm/snmpd_4.1.1-2.1_arm.deb
MD5 checksum: 48abd58e7399e245c3d3775ab59cbba3
Intel IA-32 architecture:
http://security.debian.org/dists/stable/updates/main/binary-i386/libsnmp4.1-dev_4.1.1-2.1_i386.deb
MD5 checksum: 5addf966bc067f943b4ca6c7d604a48f
http://security.debian.org/dists/stable/updates/main/binary-i386/libsnmp4.1_4.1.1-2.1_i386.deb
MD5 checksum: e1ebaeaee18859d1e58aae658e4b1564
http://security.debian.org/dists/stable/updates/main/binary-i386/snmp_4.1.1-2.1_i386.deb
MD5 checksum: 7d13633a4e8a922eb36d6bfe8a04f0f3
http://security.debian.org/dists/stable/updates/main/binary-i386/snmpd_4.1.1-2.1_i386.deb
MD5 checksum: bb63f353a4e3bba6d0bd3acc54f6a138
Motorola 680x0 architecture:
http://security.debian.org/dists/stable/updates/main/binary-m68k/libsnmp4.1-dev_4.1.1-2.1_m68k.deb
MD5 checksum: 805cc411f0b7d425275f60ef238773a4
http://security.debian.org/dists/stable/updates/main/binary-m68k/libsnmp4.1_4.1.1-2.1_m68k.deb
MD5 checksum: 021c14224b260e43276553329dc264f7
http://security.debian.org/dists/stable/updates/main/binary-m68k/snmp_4.1.1-2.1_m68k.deb
MD5 checksum: 5a8c55d92c6b721f3e1487ba858eb6e2
http://security.debian.org/dists/stable/updates/main/binary-m68k/snmpd_4.1.1-2.1_m68k.deb
MD5 checksum: 411834b9de92101366a7898f880d82eb
PowerPC architecture:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/libsnmp4.1-dev_4.1.1-2.1_powerpc.deb
MD5 checksum: a7dde01a21e7258b45285924dafd6b70
http://security.debian.org/dists/stable/updates/main/binary-powerpc/libsnmp4.1_4.1.1-2.1_powerpc.deb
MD5 checksum: a0e037e1fcebb2154fa1f41c65dfb0a8
http://security.debian.org/dists/stable/updates/main/binary-powerpc/snmp_4.1.1-2.1_powerpc.deb
MD5 checksum: 4510c8dbc86d1acc1fd31a2625b9ebc3
http://security.debian.org/dists/stable/updates/main/binary-powerpc/snmpd_4.1.1-2.1_powerpc.deb
MD5 checksum: 81acd0406d0166539d1fa61214fe7b59
Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/main/binary-sparc/libsnmp4.1-dev_4.1.1-2.1_sparc.deb
MD5 checksum: 098021d71b64d77622aaaa4ff0a7502c
http://security.debian.org/dists/stable/updates/main/binary-sparc/libsnmp4.1_4.1.1-2.1_sparc.deb
MD5 checksum: 1f5702918bfd3704abb82f72b4e9cfe8
http://security.debian.org/dists/stable/updates/main/binary-sparc/snmp_4.1.1-2.1_sparc.deb
MD5 checksum: e52aad9099ff709e94820b2bbbfd0ee1
http://security.debian.org/dists/stable/updates/main/binary-sparc/snmpd_4.1.1-2.1_sparc.deb
MD5 checksum: 813afcda0149f7a8c193b891320c14fa
These packages will be moved into the stable distribution on its next
revision.
- --
- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
iQB1AwUBPGv+nKjZR/ntlUftAQEZMwL+ILCRSWoPRc8sEWtEA8RM6oYBhRBju7k1
CXRde/RR5/qVcCo83uG55W7oog8VhK4qrE76agXvNuCKIfo2EG1jYeonFw4rRffa
RvVWfd9mHFan0TL1hE0DS8++6N2oicYb
=WUPS
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
--- End Message ---