[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA-111-1] Multiple SNMP vulnerabilities



-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory DSA-111-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
February 14, 2002
- ------------------------------------------------------------------------


Package        : ucd-snmp
Problem type   : remote exploit
Debian-specific: no
CERT Advisory  : CA-2002-03

The Secure Programming Group of the Oulu University did a study on
SNMP implementations and uncovered multiple problems which can
cause problems ranging from Denial of Service attacks to remote
exploits.

New UCD-SNMP packages have been prepared to fix these problems
as well as a few others. The complete list of fixed problems is:

* When running external programs snmpd used temporary files insecurely
* snmpd did not properly reset supplementary groups after changing
  its uid and gid
* Modified most code to use buffers instead of fixed-length strings to
  prevent buffer overflows
* The ASN.1 parser did not check for negative lengths
* the IFINDEX response handling in snmpnetstat did not do a sanity check
  on its input

(thanks to Caldera for most of the work on those patches)

The new version is 4.1.1-2.1 and we recommend you upgrade your
snmp packages immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1-2.1.diff.gz
      MD5 checksum: 96ef7f9946c3a10f100744fdc5482418
    http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1-2.1.dsc
      MD5 checksum: 03bc1ccf1a22e436a78c3e5a1ad4eefa
    http://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1.orig.tar.gz
      MD5 checksum: 2f0d6130af510a8ce283dfdb557a85fa

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/main/binary-alpha/libsnmp4.1-dev_4.1.1-2.1_alpha.deb
      MD5 checksum: e6cbb17f5295e4e663bee8369b2cf419
    http://security.debian.org/dists/stable/updates/main/binary-alpha/libsnmp4.1_4.1.1-2.1_alpha.deb
      MD5 checksum: 31c67fca601af32915020f5ce67f74cf
    http://security.debian.org/dists/stable/updates/main/binary-alpha/snmp_4.1.1-2.1_alpha.deb
      MD5 checksum: 0a82614ab42742528f9ebf13b8034410
    http://security.debian.org/dists/stable/updates/main/binary-alpha/snmpd_4.1.1-2.1_alpha.deb
      MD5 checksum: 205ab169948ac4c54665adb8dcaa8a67

  ARM architecture:
    http://security.debian.org/dists/stable/updates/main/binary-arm/libsnmp4.1-dev_4.1.1-2.1_arm.deb
      MD5 checksum: ce4597a66d4bb6a816a859f2792cc62b
    http://security.debian.org/dists/stable/updates/main/binary-arm/libsnmp4.1_4.1.1-2.1_arm.deb
      MD5 checksum: 9e96864263ab5f9489fcea655f1b0a50
    http://security.debian.org/dists/stable/updates/main/binary-arm/snmp_4.1.1-2.1_arm.deb
      MD5 checksum: 2c0361c50cf0f97a77439c0f9c834c17
    http://security.debian.org/dists/stable/updates/main/binary-arm/snmpd_4.1.1-2.1_arm.deb
      MD5 checksum: 48abd58e7399e245c3d3775ab59cbba3

  Intel IA-32 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-i386/libsnmp4.1-dev_4.1.1-2.1_i386.deb
      MD5 checksum: 5addf966bc067f943b4ca6c7d604a48f
    http://security.debian.org/dists/stable/updates/main/binary-i386/libsnmp4.1_4.1.1-2.1_i386.deb
      MD5 checksum: e1ebaeaee18859d1e58aae658e4b1564
    http://security.debian.org/dists/stable/updates/main/binary-i386/snmp_4.1.1-2.1_i386.deb
      MD5 checksum: 7d13633a4e8a922eb36d6bfe8a04f0f3
    http://security.debian.org/dists/stable/updates/main/binary-i386/snmpd_4.1.1-2.1_i386.deb
      MD5 checksum: bb63f353a4e3bba6d0bd3acc54f6a138

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-m68k/libsnmp4.1-dev_4.1.1-2.1_m68k.deb
      MD5 checksum: 805cc411f0b7d425275f60ef238773a4
    http://security.debian.org/dists/stable/updates/main/binary-m68k/libsnmp4.1_4.1.1-2.1_m68k.deb
      MD5 checksum: 021c14224b260e43276553329dc264f7
    http://security.debian.org/dists/stable/updates/main/binary-m68k/snmp_4.1.1-2.1_m68k.deb
      MD5 checksum: 5a8c55d92c6b721f3e1487ba858eb6e2
    http://security.debian.org/dists/stable/updates/main/binary-m68k/snmpd_4.1.1-2.1_m68k.deb
      MD5 checksum: 411834b9de92101366a7898f880d82eb

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/libsnmp4.1-dev_4.1.1-2.1_powerpc.deb
      MD5 checksum: a7dde01a21e7258b45285924dafd6b70
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/libsnmp4.1_4.1.1-2.1_powerpc.deb
      MD5 checksum: a0e037e1fcebb2154fa1f41c65dfb0a8
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/snmp_4.1.1-2.1_powerpc.deb
      MD5 checksum: 4510c8dbc86d1acc1fd31a2625b9ebc3
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/snmpd_4.1.1-2.1_powerpc.deb
      MD5 checksum: 81acd0406d0166539d1fa61214fe7b59

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/main/binary-sparc/libsnmp4.1-dev_4.1.1-2.1_sparc.deb
      MD5 checksum: 098021d71b64d77622aaaa4ff0a7502c
    http://security.debian.org/dists/stable/updates/main/binary-sparc/libsnmp4.1_4.1.1-2.1_sparc.deb
      MD5 checksum: 1f5702918bfd3704abb82f72b4e9cfe8
    http://security.debian.org/dists/stable/updates/main/binary-sparc/snmp_4.1.1-2.1_sparc.deb
      MD5 checksum: e52aad9099ff709e94820b2bbbfd0ee1
    http://security.debian.org/dists/stable/updates/main/binary-sparc/snmpd_4.1.1-2.1_sparc.deb
      MD5 checksum: 813afcda0149f7a8c193b891320c14fa

  These packages will be moved into the stable distribution on its next
  revision.

- -- 
- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBPGv+nKjZR/ntlUftAQEZMwL+ILCRSWoPRc8sEWtEA8RM6oYBhRBju7k1
CXRde/RR5/qVcCo83uG55W7oog8VhK4qrE76agXvNuCKIfo2EG1jYeonFw4rRffa
RvVWfd9mHFan0TL1hE0DS8++6N2oicYb
=WUPS
-----END PGP SIGNATURE-----



Reply to: