-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2002.084 -- Debian Security Advisory DSA-111-1
                       Multiple SNMP vulnerabilities
                             19 February 2002

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                ucd-snmp
Vendor:                 Debian
Operating System:       Debian GNU/Linux 2.2
Platform:               Alpha
                        ARM
                        i386
                        Motorola 680x0
                        PowerPC
                        SPARC
Impact:                 Execute Arbitrary Code/Commands
                        Denial of Service
Access Required:        Remote

Ref:                    AL-2002.02
                        ESB-2002.065

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-111-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
February 14, 2002
- - ------------------------------------------------------------------------


Package        : ucd-snmp
Problem type   : remote exploit
Debian-specific: no
CERT Advisory  : CA-2002-03

The Secure Programming Group of the Oulu University did a study on
SNMP implementations and uncovered multiple problems which can
cause problems ranging from Denial of Service attacks to remote
exploits.

New UCD-SNMP packages have been prepared to fix these problems
as well as a few others. The complete list of fixed problems is:

* When running external programs snmpd used temporary files insecurely
* snmpd did not properly reset supplementary groups after changing
  its uid and gid
* Modified most code to use buffers instead of fixed-length strings to
  prevent buffer overflows
* The ASN.1 parser did not check for negative lengths
* the IFINDEX response handling in snmpnetstat did not do a sanity check
  on its input

(thanks to Caldera for most of the work on those patches)

The new version is 4.1.1-2.1 and we recommend you upgrade your
snmp packages immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- - ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1-2.1.diff.gz
      MD5 checksum: 96ef7f9946c3a10f100744fdc5482418
    http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1-2.1.dsc
      MD5 checksum: 03bc1ccf1a22e436a78c3e5a1ad4eefa
    http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1.orig.tar.gz
      MD5 checksum: 2f0d6130af510a8ce283dfdb557a85fa

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/main/binary-alpha/libsnmp4.1-dev_4.1.1-2.1_alpha.deb
      MD5 checksum: e6cbb17f5295e4e663bee8369b2cf419
    http://security.debian.org/dists/stable/updates/main/binary-alpha/libsnmp4.1_4.1.1-2.1_alpha.deb
      MD5 checksum: 31c67fca601af32915020f5ce67f74cf
    http://security.debian.org/dists/stable/updates/main/binary-alpha/snmp_4.1.1-2.1_alpha.deb
      MD5 checksum: 0a82614ab42742528f9ebf13b8034410
    http://security.debian.org/dists/stable/updates/main/binary-alpha/snmpd_4.1.1-2.1_alpha.deb
      MD5 checksum: 205ab169948ac4c54665adb8dcaa8a67

  ARM architecture:
    http://security.debian.org/dists/stable/updates/main/binary-arm/libsnmp4.1-dev_4.1.1-2.1_arm.deb
      MD5 checksum: ce4597a66d4bb6a816a859f2792cc62b
    http://security.debian.org/dists/stable/updates/main/binary-arm/libsnmp4.1_4.1.1-2.1_arm.deb
      MD5 checksum: 9e96864263ab5f9489fcea655f1b0a50
    http://security.debian.org/dists/stable/updates/main/binary-arm/snmp_4.1.1-2.1_arm.deb
      MD5 checksum: 2c0361c50cf0f97a77439c0f9c834c17
    http://security.debian.org/dists/stable/updates/main/binary-arm/snmpd_4.1.1-2.1_arm.deb
      MD5 checksum: 48abd58e7399e245c3d3775ab59cbba3

  Intel IA-32 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-i386/libsnmp4.1-dev_4.1.1-2.1_i386.deb
      MD5 checksum: 5addf966bc067f943b4ca6c7d604a48f
    http://security.debian.org/dists/stable/updates/main/binary-i386/libsnmp4.1_4.1.1-2.1_i386.deb
      MD5 checksum: e1ebaeaee18859d1e58aae658e4b1564
    http://security.debian.org/dists/stable/updates/main/binary-i386/snmp_4.1.1-2.1_i386.deb
      MD5 checksum: 7d13633a4e8a922eb36d6bfe8a04f0f3
    http://security.debian.org/dists/stable/updates/main/binary-i386/snmpd_4.1.1-2.1_i386.deb
      MD5 checksum: bb63f353a4e3bba6d0bd3acc54f6a138

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-m68k/libsnmp4.1-dev_4.1.1-2.1_m68k.deb
      MD5 checksum: 805cc411f0b7d425275f60ef238773a4
    http://security.debian.org/dists/stable/updates/main/binary-m68k/libsnmp4.1_4.1.1-2.1_m68k.deb
      MD5 checksum: 021c14224b260e43276553329dc264f7
    http://security.debian.org/dists/stable/updates/main/binary-m68k/snmp_4.1.1-2.1_m68k.deb
      MD5 checksum: 5a8c55d92c6b721f3e1487ba858eb6e2
    http://security.debian.org/dists/stable/updates/main/binary-m68k/snmpd_4.1.1-2.1_m68k.deb
      MD5 checksum: 411834b9de92101366a7898f880d82eb

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/libsnmp4.1-dev_4.1.1-2.1_powerpc.deb
      MD5 checksum: a7dde01a21e7258b45285924dafd6b70
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/libsnmp4.1_4.1.1-2.1_powerpc.deb
      MD5 checksum: a0e037e1fcebb2154fa1f41c65dfb0a8
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/snmp_4.1.1-2.1_powerpc.deb
      MD5 checksum: 4510c8dbc86d1acc1fd31a2625b9ebc3
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/snmpd_4.1.1-2.1_powerpc.deb
      MD5 checksum: 81acd0406d0166539d1fa61214fe7b59

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/main/binary-sparc/libsnmp4.1-dev_4.1.1-2.1_sparc.deb
      MD5 checksum: 098021d71b64d77622aaaa4ff0a7502c
    http://security.debian.org/dists/stable/updates/main/binary-sparc/libsnmp4.1_4.1.1-2.1_sparc.deb
      MD5 checksum: 1f5702918bfd3704abb82f72b4e9cfe8
    http://security.debian.org/dists/stable/updates/main/binary-sparc/snmp_4.1.1-2.1_sparc.deb
      MD5 checksum: e52aad9099ff709e94820b2bbbfd0ee1
    http://security.debian.org/dists/stable/updates/main/binary-sparc/snmpd_4.1.1-2.1_sparc.deb
      MD5 checksum: 813afcda0149f7a8c193b891320c14fa

  These packages will be moved into the stable distribution on its next
  revision.

- - -- 
- - ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

- -----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBPGv+nKjZR/ntlUftAQEZMwL+ILCRSWoPRc8sEWtEA8RM6oYBhRBju7k1
CXRde/RR5/qVcCo83uG55W7oog8VhK4qrE76agXvNuCKIfo2EG1jYeonFw4rRffa
RvVWfd9mHFan0TL1hE0DS8++6N2oicYb
=WUPS
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBPHKCCCh9+71yA2DNAQF0cwP+OyquhhgxY8VJ/Tn5RObyRXtQQX0CKJEy
4j+Us5VHUzlW7apLk905sOpbM3qpsglqn1apHpZxmqCxaFtDvPlNwFEcwDsLNR2d
VNjJwl7keLPfpnQjgH6WAEzXSTyDMMWo0qvNXWY1flXD4JMtXXvld6G/AERNRM2y
YxKqmcyGB5I=
=kh3a
-----END PGP SIGNATURE-----