[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2001/dsa-0{70,56,48}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2001/dsa-048.wml	2001-05-10 03:46:56.000000000 +0600
+++ russian/security/2001/dsa-048.wml	2016-07-07 17:07:48.794412611 +0500
@@ -1,30 +1,31 @@
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
 <define-tag moreinfo>
- -Marcus Meissner discovered that samba was not creating temporary
- -files safely in two places:
+Ð?аÑ?кÑ?Ñ? Ð?айÑ?неÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о samba Ñ?оздаÑ?Ñ? вÑ?еменнÑ?е Ñ?айлÑ? небезопаÑ?нÑ?м
+Ñ?поÑ?обом в двÑ?Ñ? меÑ?Ñ?аÑ?:
 
 <ul>
- -<li>when a remote user queried a printer queue samba would create a
- -    temporary file in which the queue data would be written. This was being
- -    done using a predictable filename, and insecurely, allowing a local
- -    attacker to trick samba into overwriting arbitrary files.
- -<li>smbclient "more" and "mput" commands also created temporary files
- -    in /tmp insecurely.
+<li>когда Ñ?далÑ?ннÑ?й полÑ?зоваÑ?елÑ? запÑ?аÑ?иваеÑ? оÑ?еÑ?едÑ? пеÑ?аÑ?и, samba Ñ?оздаÑ?Ñ?
+    вÑ?еменнÑ?й Ñ?айл, в коÑ?оÑ?Ñ?й запиÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? даннÑ?е об оÑ?еÑ?еди пеÑ?аÑ?и. ЭÑ?оÑ? Ñ?айл
+    имееÑ? пÑ?едÑ?казÑ?емое имÑ? и не Ñ?влÑ?еÑ?Ñ?Ñ? безопаÑ?нÑ?м, Ñ?Ñ?о позволÑ?еÑ? локалÑ?номÑ?
+    злоÑ?мÑ?Ñ?ленникÑ? иÑ?полÑ?зоваÑ?Ñ? samba длÑ? пеÑ?езапиÑ?и пÑ?оизволÑ?нÑ?Ñ? Ñ?айлов.
+<li>Ð?омандÑ? smbclient "more" и "mput" Ñ?оже Ñ?оздаÑ?Ñ? вÑ?еменнÑ?е Ñ?айлÑ?
+    в /tmp небезопаÑ?нÑ?м обÑ?азом.
 </ul>
 
- -<p>Both problems have been fixed in version 2.0.7-3.2, and we recommend
- -that you upgrade your samba package immediately. (This problem is also fixed
- -in the Samba 2.2 codebase.)
+<p>Ð?бе пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2.0.7-3.2, Ñ?екомендÑ?еÑ?Ñ?Ñ? как можно
+Ñ?коÑ?ее обновиÑ?Ñ? пакеÑ? samba. (Ð?Ñ?оме Ñ?ого, Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в коде Samba 2.2.)
 
- -<p>Note: DSA-048-1 included an incorrectly compiled sparc package, which
- -the second edition fixed.
+<p>Ð?нимание: Ñ?екомендаÑ?иÑ? DSA-048-1 вклÑ?Ñ?ала в Ñ?ебÑ? некоÑ?Ñ?екÑ?но Ñ?компилиÑ?ованнÑ?й пакеÑ?
+длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? sparc, Ñ?Ñ?оÑ? недоÑ?Ñ?аÑ?ок иÑ?пÑ?авлен во вÑ?оÑ?ой Ñ?едакÑ?ии Ñ?екомендаÑ?ии.
 
- -<p>The third edition of the advisory was made because Marc Jacobsen from HP
- -discovered that the security fixes from samba 2.0.8 did not fully fix the
- -/tmp symlink attack problem. The samba team released version 2.0.9 to fix
- -that, and those fixes have been added to version 2.0.7-3.3 of the Debian
- -samba packages.
+<p>ТÑ?еÑ?Ñ?Ñ? Ñ?едакÑ?иÑ? данной Ñ?екомендаÑ?ии бÑ?ла вÑ?пÑ?Ñ?ена поÑ?омÑ?, Ñ?Ñ?о Ð?аÑ?к ЯкобÑ?ен из HP
+обнаÑ?Ñ?жил, Ñ?Ñ?о иÑ?пÑ?авлениÑ? безопаÑ?ноÑ?Ñ?и из samba 2.0.8 не полноÑ?Ñ?Ñ?Ñ? иÑ?пÑ?авлÑ?Ñ?Ñ?
+пÑ?облемÑ? Ñ? аÑ?акой Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки в /tmp. Ð?оманда samba вÑ?пÑ?Ñ?Ñ?ила веÑ?Ñ?иÑ? 2.0.9
+длÑ? иÑ?пÑ?авлениÑ? Ñ?Ñ?ой пÑ?облемÑ?, Ñ?Ñ?и иÑ?пÑ?авлениÑ? Ñ?акже бÑ?ли добавленÑ? в веÑ?Ñ?иÑ? 2.0.7-3.3
+пакеÑ?ов samba длÑ? Debian.
 </define-tag>
- -<define-tag description>symlink attack</define-tag>
+<define-tag description>аÑ?ака Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки</define-tag>
 
 # do not modify the following line
 #include '$(ENGLISHDIR)/security/2001/dsa-048.data'
- --- english/security/2001/dsa-056.wml	2004-09-17 19:27:54.000000000 +0600
+++ russian/security/2001/dsa-056.wml	2016-07-07 17:01:09.723232451 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>local file overwrite</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>локалÑ?наÑ? пеÑ?езапиÑ?Ñ? Ñ?айла</define-tag>
 <define-tag moreinfo>
- -Ethan Benson found a bug in man-db packages as distributed in
- -Debian GNU/Linux 2.2. man-db includes a mandb tool which is used to
- -build an index of the manual pages installed on a system. When the -u or
- --c option were given on the command-line to tell it to write its database
- -to a different location it failed to properly drop privileges before
- -creating a temporary file. This makes it possible for an attacker to do
- -a standard symlink attack to trick mandb into overwriting any file that
- -is writable by uid man, which includes the man and mandb binaries.
+ЭÑ?ан Ð?енÑ?он обнаÑ?Ñ?жил оÑ?ибкÑ? в пакеÑ?аÑ? man-db, поÑ?Ñ?авлÑ?емÑ?Ñ? в Ñ?оÑ?Ñ?аве
+Debian GNU/Linux 2.2. Ð?акеÑ? man-db Ñ?одеÑ?жиÑ? инÑ?Ñ?Ñ?Ñ?менÑ? mandb, иÑ?полÑ?зÑ?емÑ?й длÑ?
+Ñ?боÑ?ки Ñ?казаÑ?елÑ? длÑ? Ñ?Ñ?Ñ?ановленнÑ?Ñ? в Ñ?иÑ?Ñ?еме Ñ?Ñ?Ñ?аниÑ? Ñ?Ñ?ководÑ?Ñ?ва. Ð?Ñ?ли иÑ?полÑ?зÑ?Ñ?Ñ?Ñ?Ñ?
+опÑ?ии -u или -c длÑ? Ñ?ого, Ñ?Ñ?обÑ? вÑ?полниÑ?Ñ? запиÑ?Ñ? базÑ? даннÑ?Ñ? в какое-Ñ?о
+дÑ?Ñ?гое меÑ?Ñ?о, Ñ?о пÑ?огÑ?амма не вÑ?полнÑ?еÑ? коÑ?Ñ?екÑ?нÑ?й Ñ?бÑ?оÑ? пÑ?ивилегий до
+моменÑ?а Ñ?озданиÑ? вÑ?еменного Ñ?айла. ЭÑ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ?
+аÑ?аки Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки Ñ?ак, Ñ?Ñ?обÑ? пÑ?огÑ?амма mandb пеÑ?езапиÑ?ала лÑ?бой Ñ?айл,
+коÑ?оÑ?Ñ?й оÑ?кÑ?Ñ?Ñ? длÑ? запиÑ?и длÑ? полÑ?зоваÑ?елÑ?Ñ?кого иденÑ?иÑ?икаÑ?оÑ?а man, Ñ?Ñ?о вклÑ?Ñ?аеÑ? в Ñ?ебÑ? двоиÑ?нÑ?е Ñ?айлÑ? man и mandb.
 
- -<p>This has been fixed in version 2.3.16-3, and we recommend that you
- -upgrade your man-db package immediately. If you use suidmanager
- -you can also use that to make sure man and mandb are not installed
- -suid which protects you from this problem. This can be done with the
- -following commands:
+<p>ЭÑ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 2.3.16-3, Ñ?екомендÑ?еÑ?Ñ?Ñ? как можно
+Ñ?коÑ?ее обновиÑ?Ñ? пакеÑ? man-db. Ð?Ñ?ли вÑ? иÑ?полÑ?зÑ?еÑ?е suidmanager, Ñ?о
+Ñ?акже вÑ? можеÑ?е Ñ?бедиÑ?Ñ?Ñ?Ñ?, Ñ?Ñ?о man и mandb не имеÑ?Ñ? Ñ?лага пÑ?ав доÑ?Ñ?Ñ?па, позволÑ?Ñ?Ñ?его
+запÑ?Ñ?каÑ?Ñ? иÑ? оÑ? лиÑ?а владелÑ?Ñ?а, Ñ?Ñ?о заÑ?иÑ?иÑ? ваÑ? оÑ? Ñ?Ñ?ой пÑ?облемÑ?. ЭÑ?о можно пÑ?оделаÑ?Ñ? Ñ?
+помоÑ?Ñ?Ñ? Ñ?ледÑ?Ñ?Ñ?иÑ? команд:
 
 <pre>
   suidregister /usr/lib/man-db/man root root 0755
   suidregister /usr/lib/man-db/mandb root root 0755
 </pre>
 
- -<p>Of course even when using suidmanager an upgrade is still strongly
- -recommended.
+<p>Ð?онеÑ?но, даже еÑ?ли иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? suidmanager, вÑ?Ñ? Ñ?авно наÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ?
+вÑ?полниÑ?Ñ? обновление.
 </define-tag>
 
 # do not modify the following line
- --- english/security/2001/dsa-070.wml	2002-03-18 06:18:02.000000000 +0500
+++ russian/security/2001/dsa-070.wml	2016-07-07 16:53:58.524307149 +0500
@@ -1,26 +1,27 @@
- -<define-tag description>remote exploit</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>Ñ?далÑ?ннаÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ?</define-tag>
 <define-tag moreinfo>
- -The netkit-telnet daemon contained in the <code>telnetd</code> package version
- -0.16-4potato1, which is shipped with
- -the "stable" (2.2, potato) distribution of Debian GNU/Linux, is vulnerable to an
- -exploitable overflow in its output handling.
+СлÑ?жба netkit-telnet из пакеÑ?а <code>telnetd</code> веÑ?Ñ?ии
+0.16-4potato1, поÑ?Ñ?авлÑ?емого в Ñ?оÑ?Ñ?аве
+Ñ?Ñ?абилÑ?ного (2.2, potato) вÑ?пÑ?Ñ?ка Debian GNU/Linux Ñ?Ñ?звима
+к пеÑ?еполнениÑ? в коде обÑ?абоÑ?ки вÑ?вода.
 
 <p>
- -The original bug was found by &lt;scut@nb.in-berlin.de&gt;, and announced to
- -bugtraq on Jul 18 2001. At that time, netkit-telnet versions after 0.14 were
- -not believed to be vulnerable.
+Ð?еÑ?вонаÑ?алÑ?но оÑ?ибка бÑ?ла обнаÑ?Ñ?жен &lt;scut@nb.in-berlin.de&gt; и заÑ?влена в
+bugtraq 18 иÑ?лÑ? 2001 года. Ð? наÑ?Ñ?оÑ?Ñ?ее вÑ?емÑ? Ñ?Ñ?иÑ?аеÑ?Ñ?Ñ?, Ñ?Ñ?о пакеÑ? netkit-telnet веÑ?Ñ?ий Ñ?Ñ?аÑ?Ñ?е 0.14
+не подвеÑ?жен Ñ?Ñ?ой пÑ?облеме.
 
 <p>
- -On Aug 10 2001, zen-parse posted an advisory based on the same problem, for
- -all netkit-telnet versions below 0.17.
+10 авгÑ?Ñ?Ñ?а 2001 года zen-parse опÑ?бликовал Ñ?екомендаÑ?иÑ? по поводÑ? Ñ?Ñ?одной пÑ?облемÑ? длÑ? вÑ?еÑ?
+веÑ?Ñ?ий netkit-telnet младÑ?е 0.17.
 
 <p>
- -More details can be found on <a href="http://online.securityfocus.com/archive/1/203000";>http://online.securityfocus.com/archive/1/203000</a>.
- -As Debian uses the `telnetd' user to run <code>in.telnetd</code>, this is not a remote
- -root compromise on Debian systems; however, the user `telnetd' can be compromised.
+Ð?одÑ?обноÑ?Ñ?и можно найÑ?и по адÑ?еÑ?Ñ? <a href="http://online.securityfocus.com/archive/1/203000";>http://online.securityfocus.com/archive/1/203000</a>.
+Ð?оÑ?колÑ?кÑ? Debian иÑ?полÑ?зÑ?еÑ? полÑ?зоваÑ?елÑ? `telnetd' длÑ? запÑ?Ñ?ка <code>in.telnetd</code>, поÑ?Ñ?олÑ?кÑ? Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ?
+не пÑ?иводиÑ? к компÑ?омеÑ?аÑ?ии Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ? в Ñ?иÑ?Ñ?емаÑ? Debian; Ñ?ем не менее, полÑ?зоваÑ?елÑ? `telnetd' можеÑ? бÑ?Ñ?Ñ? компÑ?омеÑ?иÑ?ован.
 
- -<p>We strongly advise you update your <code>telnetd</code> package to the versions
- -listed below.
+<p>Ð?аÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?овеÑ?Ñ?ем обновиÑ?Ñ? пакеÑ? <code>telnetd</code> до Ñ?казаннÑ?Ñ?
+ниже веÑ?Ñ?ий.
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=uywf
-----END PGP SIGNATURE-----


Reply to: