Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2002.084 -- Debian Security Advisory DSA-111-1 Multiple SNMP vulnerabilities 19 February 2002 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ucd-snmp Vendor: Debian Operating System: Debian GNU/Linux 2.2 Platform: Alpha ARM i386 Motorola 680x0 PowerPC SPARC Impact: Execute Arbitrary Code/Commands Denial of Service Access Required: Remote Ref: AL-2002.02 ESB-2002.065 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- - - ------------------------------------------------------------------------ Debian Security Advisory DSA-111-1 security@debian.org http://www.debian.org/security/ Wichert Akkerman February 14, 2002 - - ------------------------------------------------------------------------ Package : ucd-snmp Problem type : remote exploit Debian-specific: no CERT Advisory : CA-2002-03 The Secure Programming Group of the Oulu University did a study on SNMP implementations and uncovered multiple problems which can cause problems ranging from Denial of Service attacks to remote exploits. New UCD-SNMP packages have been prepared to fix these problems as well as a few others. The complete list of fixed problems is: * When running external programs snmpd used temporary files insecurely * snmpd did not properly reset supplementary groups after changing its uid and gid * Modified most code to use buffers instead of fixed-length strings to prevent buffer overflows * The ASN.1 parser did not check for negative lengths * the IFINDEX response handling in snmpnetstat did not do a sanity check on its input (thanks to Caldera for most of the work on those patches) The new version is 4.1.1-2.1 and we recommend you upgrade your snmp packages immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.2 alias potato - - --------------------------------- Potato was released for alpha, arm, i386, m68k, powerpc and sparc. Source archives: http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1-2.1.diff.gz MD5 checksum: 96ef7f9946c3a10f100744fdc5482418 http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1-2.1.dsc MD5 checksum: 03bc1ccf1a22e436a78c3e5a1ad4eefa http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1.orig.tar.gz MD5 checksum: 2f0d6130af510a8ce283dfdb557a85fa Alpha architecture: http://security.debian.org/dists/stable/updates/main/binary-alpha/libsnmp4.1-dev_4.1.1-2.1_alpha.deb MD5 checksum: e6cbb17f5295e4e663bee8369b2cf419 http://security.debian.org/dists/stable/updates/main/binary-alpha/libsnmp4.1_4.1.1-2.1_alpha.deb MD5 checksum: 31c67fca601af32915020f5ce67f74cf http://security.debian.org/dists/stable/updates/main/binary-alpha/snmp_4.1.1-2.1_alpha.deb MD5 checksum: 0a82614ab42742528f9ebf13b8034410 http://security.debian.org/dists/stable/updates/main/binary-alpha/snmpd_4.1.1-2.1_alpha.deb MD5 checksum: 205ab169948ac4c54665adb8dcaa8a67 ARM architecture: http://security.debian.org/dists/stable/updates/main/binary-arm/libsnmp4.1-dev_4.1.1-2.1_arm.deb MD5 checksum: ce4597a66d4bb6a816a859f2792cc62b http://security.debian.org/dists/stable/updates/main/binary-arm/libsnmp4.1_4.1.1-2.1_arm.deb MD5 checksum: 9e96864263ab5f9489fcea655f1b0a50 http://security.debian.org/dists/stable/updates/main/binary-arm/snmp_4.1.1-2.1_arm.deb MD5 checksum: 2c0361c50cf0f97a77439c0f9c834c17 http://security.debian.org/dists/stable/updates/main/binary-arm/snmpd_4.1.1-2.1_arm.deb MD5 checksum: 48abd58e7399e245c3d3775ab59cbba3 Intel IA-32 architecture: http://security.debian.org/dists/stable/updates/main/binary-i386/libsnmp4.1-dev_4.1.1-2.1_i386.deb MD5 checksum: 5addf966bc067f943b4ca6c7d604a48f http://security.debian.org/dists/stable/updates/main/binary-i386/libsnmp4.1_4.1.1-2.1_i386.deb MD5 checksum: e1ebaeaee18859d1e58aae658e4b1564 http://security.debian.org/dists/stable/updates/main/binary-i386/snmp_4.1.1-2.1_i386.deb MD5 checksum: 7d13633a4e8a922eb36d6bfe8a04f0f3 http://security.debian.org/dists/stable/updates/main/binary-i386/snmpd_4.1.1-2.1_i386.deb MD5 checksum: bb63f353a4e3bba6d0bd3acc54f6a138 Motorola 680x0 architecture: http://security.debian.org/dists/stable/updates/main/binary-m68k/libsnmp4.1-dev_4.1.1-2.1_m68k.deb MD5 checksum: 805cc411f0b7d425275f60ef238773a4 http://security.debian.org/dists/stable/updates/main/binary-m68k/libsnmp4.1_4.1.1-2.1_m68k.deb MD5 checksum: 021c14224b260e43276553329dc264f7 http://security.debian.org/dists/stable/updates/main/binary-m68k/snmp_4.1.1-2.1_m68k.deb MD5 checksum: 5a8c55d92c6b721f3e1487ba858eb6e2 http://security.debian.org/dists/stable/updates/main/binary-m68k/snmpd_4.1.1-2.1_m68k.deb MD5 checksum: 411834b9de92101366a7898f880d82eb PowerPC architecture: http://security.debian.org/dists/stable/updates/main/binary-powerpc/libsnmp4.1-dev_4.1.1-2.1_powerpc.deb MD5 checksum: a7dde01a21e7258b45285924dafd6b70 http://security.debian.org/dists/stable/updates/main/binary-powerpc/libsnmp4.1_4.1.1-2.1_powerpc.deb MD5 checksum: a0e037e1fcebb2154fa1f41c65dfb0a8 http://security.debian.org/dists/stable/updates/main/binary-powerpc/snmp_4.1.1-2.1_powerpc.deb MD5 checksum: 4510c8dbc86d1acc1fd31a2625b9ebc3 http://security.debian.org/dists/stable/updates/main/binary-powerpc/snmpd_4.1.1-2.1_powerpc.deb MD5 checksum: 81acd0406d0166539d1fa61214fe7b59 Sun Sparc architecture: http://security.debian.org/dists/stable/updates/main/binary-sparc/libsnmp4.1-dev_4.1.1-2.1_sparc.deb MD5 checksum: 098021d71b64d77622aaaa4ff0a7502c http://security.debian.org/dists/stable/updates/main/binary-sparc/libsnmp4.1_4.1.1-2.1_sparc.deb MD5 checksum: 1f5702918bfd3704abb82f72b4e9cfe8 http://security.debian.org/dists/stable/updates/main/binary-sparc/snmp_4.1.1-2.1_sparc.deb MD5 checksum: e52aad9099ff709e94820b2bbbfd0ee1 http://security.debian.org/dists/stable/updates/main/binary-sparc/snmpd_4.1.1-2.1_sparc.deb MD5 checksum: 813afcda0149f7a8c193b891320c14fa These packages will be moved into the stable distribution on its next revision. - - -- - - ---------------------------------------------------------------------------- apt-get: deb http://security.debian.org/ stable/updates main dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQB1AwUBPGv+nKjZR/ntlUftAQEZMwL+ILCRSWoPRc8sEWtEA8RM6oYBhRBju7k1 CXRde/RR5/qVcCo83uG55W7oog8VhK4qrE76agXvNuCKIfo2EG1jYeonFw4rRffa RvVWfd9mHFan0TL1hE0DS8++6N2oicYb =WUPS - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBPHKCCCh9+71yA2DNAQF0cwP+OyquhhgxY8VJ/Tn5RObyRXtQQX0CKJEy 4j+Us5VHUzlW7apLk905sOpbM3qpsglqn1apHpZxmqCxaFtDvPlNwFEcwDsLNR2d VNjJwl7keLPfpnQjgH6WAEzXSTyDMMWo0qvNXWY1flXD4JMtXXvld6G/AERNRM2y YxKqmcyGB5I= =kh3a -----END PGP SIGNATURE-----