Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2001.473 -- RHSA-2001:101-07 New ucd-snmp package to fix several security vulnerabilities 8 November 2001 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ucd-snmp Vendor: Red Hat Operating System: Red Hat Linux 6.2 Red Hat Linux 7.0 Red Hat Linux 7.1 Platform: Alpha i386 IA-64 Sparc Impact: Root Compromise Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- - --------------------------------------------------------------------- Red Hat, Inc. Red Hat Security Advisory Synopsis: New ucd-snmp package to fix several security vulnerabilities Advisory ID: RHSA-2001:101-07 Issue date: 2001-08-15 Updated on: 2001-10-31 Product: Red Hat Linux Keywords: ucd-snmp security fix Cross references: Obsoletes: - --------------------------------------------------------------------- 1. Topic: Updated ucd-snmp packages are now available for Red Hat Linux 6.2, 7 and 7.1. These packages include fixes for the following problems: - /tmp race and setgroups() privilege problem - Various buffer overflow and format string issues - One signedness problem in ASN handling It is recommended that all users update to the fixed packages. 2. Relevant releases/architectures: Red Hat Linux 6.2 - alpha, i386, sparc Red Hat Linux 7.0 - alpha, i386 Red Hat Linux 7.1 - alpha, i386, ia64 3. Problem description: Due to the mentioned security problems a remote attacker might obtain superuser privileges on a vulnerable host. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/ucd-snmp-4.2.1-4.6.x.src.rpm alpha: ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-4.2.1-4.6.x.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-devel-4.2.1-4.6.x.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-utils-4.2.1-4.6.x.alpha.rpm i386: ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-4.2.1-4.6.x.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-devel-4.2.1-4.6.x.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-utils-4.2.1-4.6.x.i386.rpm sparc: ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-4.2.1-4.6.x.sparc.rpm ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-devel-4.2.1-4.6.x.sparc.rpm ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-utils-4.2.1-4.6.x.sparc.rpm Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm alpha: ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm i386: ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm alpha: ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm i386: ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm ia64: ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-4.2.1-4.7.x.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-devel-4.2.1-4.7.x.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-utils-4.2.1-4.7.x.ia64.rpm 7. Verification: MD5 sum Package Name - -------------------------------------------------------------------------- 50fbf0b59533287c6ca7f2e831097ca1 6.2/en/os/SRPMS/ucd-snmp-4.2.1-4.6.x.src.rpm fc1f7b4b390e55623a4f112d6d22df3f 6.2/en/os/alpha/ucd-snmp-4.2.1-4.6.x.alpha.rpm 02df074653c0f12c1ff91623068e37b7 6.2/en/os/alpha/ucd-snmp-devel-4.2.1-4.6.x.alpha.rpm ebb4943126a26503eeb63f69272ced55 6.2/en/os/alpha/ucd-snmp-utils-4.2.1-4.6.x.alpha.rpm 4525cae85645e8b90f3df6e7b304969b 6.2/en/os/i386/ucd-snmp-4.2.1-4.6.x.i386.rpm 431a301c54348c1e3db4598a48ed8a7f 6.2/en/os/i386/ucd-snmp-devel-4.2.1-4.6.x.i386.rpm 199fef0186401d6aaebad5cb420f1f5a 6.2/en/os/i386/ucd-snmp-utils-4.2.1-4.6.x.i386.rpm 6767ded2ab1c9be85ed6bdef3ef99bb0 6.2/en/os/sparc/ucd-snmp-4.2.1-4.6.x.sparc.rpm 88393bda9bdcb8eaff5446ef99706780 6.2/en/os/sparc/ucd-snmp-devel-4.2.1-4.6.x.sparc.rpm 35697b8870fb665ce7bd320ec553406d 6.2/en/os/sparc/ucd-snmp-utils-4.2.1-4.6.x.sparc.rpm 324fe7a1b365aee05ab0ea021e2fa31b 7.0/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm 923fcf52bca69c7e0158694b5d36cff8 7.0/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm e93308a3f78d56128699365c02cc4104 7.0/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm bf73c635ea5ae22e8a807c9b693074b7 7.0/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm bf77ed26156daf3a677aa5309624b375 7.0/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm e6928929f4eb9f0fd0e1981fa233d421 7.0/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm 0ecc7a4a846747b857943b0f90862f32 7.0/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm 324fe7a1b365aee05ab0ea021e2fa31b 7.1/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm 923fcf52bca69c7e0158694b5d36cff8 7.1/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm e93308a3f78d56128699365c02cc4104 7.1/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm bf73c635ea5ae22e8a807c9b693074b7 7.1/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm bf77ed26156daf3a677aa5309624b375 7.1/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm e6928929f4eb9f0fd0e1981fa233d421 7.1/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm 0ecc7a4a846747b857943b0f90862f32 7.1/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm 95bee57049321a71a652378a5d9bc924 7.1/en/os/ia64/ucd-snmp-4.2.1-4.7.x.ia64.rpm 7da94da3bddc150e3c49f8e90c7f08eb 7.1/en/os/ia64/ucd-snmp-devel-4.2.1-4.7.x.ia64.rpm 59d0791af0a8c717d6fdad0e967d823a 7.1/en/os/ia64/ucd-snmp-utils-4.2.1-4.7.x.ia64.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Copyright(c) 2000, 2001 Red Hat, Inc. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBO+pmwSh9+71yA2DNAQHafQQAl2j9ydmGOlAou/CV2QyLNIJrVP0ap6v7 sUeUafiMFsIhwybtkRzXNXgP03RX7xxAPE+1d3HJEkQEqPY9nHwqolvtg7w86Zuc ahRsWW2PXMnkGQJDPh69DEJyccl4D7vLrU8Yw5Vc8dwDAm/3o/YGc8s0LIsJZ3mF dIcI66ZP2yA= =DI+J -----END PGP SIGNATURE-----