[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 406/03 - Conectiva - overflow vulnerabilities in ucd-snmp + mpg123



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 406/03 dated 16.07.03  Time: 11:00
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

Two Conectiva Security Advisories:

1: Remote heap overflow vulnerability in ucd-snmp

2: Local buffer overflow vulnerability in mpg123

Detail
====== 

1: Remote heap overflow vulnerability in ucd-snmp

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- - --------------------------------------------------------------------------

PACKAGE   : ucd-snmp
SUMMARY   : Remote heap overflow vulnerability
DATE      : 2003-07-15 15:03:00
ID        : CLA-2003:696
RELEVANT
RELEASES  : 7.0, 8

- - -------------------------------------------------------------------------

DESCRIPTION
 ucd-snmp is an implementation and a set of tools to deal with the
 Simple Network Management Protocol (SNMP), which is used for remote
 administration and monitoring of network devices and services.
 
 Axioma Security Research found[1] a remote heap overflow
 vulnerability[2] in snmpnetstat (a tool used to retrieve information
 about a remote host). When a list of interfaces is requested, a
 malicious server can return information in a way that will cause a
 heap overflow in snmpnetstat.
 
 A remote atacker able to control a snmp server can exploit this
 vulnerability to execute arbitrary code with the privileges of the
 user running snmpnetstat.


SOLUTION
 All ucd-snmp users should upgrade.
 
 
 REFERENCES:
 1.http://www.securityfocus.com/archive/1/248141
 2.http://www.securityfocus.com/bid/3780


UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/ucd-snmp-4.2.3-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/ucd-snmp-devel-4.2.3-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/ucd-snmp-devel-static-4.2.3-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/ucd-snmp-utils-4.2.3-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/ucd-snmp-4.2.3-1U70_2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/ucd-snmp-4.2.3-4U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/ucd-snmp-devel-4.2.3-4U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/ucd-snmp-devel-static-4.2.3-4U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/ucd-snmp-utils-4.2.3-4U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/ucd-snmp-4.2.3-4U80_1cl.src.rpm


ADDITIONAL INSTRUCTIONS
 The apt tool can be used to perform RPM packages upgrades:

 - run:                 apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions reagarding the use of apt and upgrade examples 
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en

- - -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at 
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en

- - -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en

- - -------------------------------------------------------------------------
Copyright (c) 2003 Conectiva Inc.
http://www.conectiva.com

- - -------------------------------------------------------------------------
subscribe: conectiva-updates-subscribe@xxxxxxxxxxxxxxxxxxxxxxxxxxx
unsubscribe: conectiva-updates-unsubscribe@xxxxxxxxxxxxxxxxxxxxxxxxxxx
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE/FELJ42jd0JmAcZARAs8OAKDf9mF+K3ilnEUJVX8cJW4CbvpTmACg7rTH
l3/5TCVh5Y7xfLc41vC35wA=
=fCcg
- -----END PGP SIGNATURE-----

2: Local buffer overflow vulnerability in mpg123

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- - --------------------------------------------------------------------------

PACKAGE   : mpg123
SUMMARY   : Local buffer overflow vulnerability
DATE      : 2003-07-15 14:43:00
ID        : CLA-2003:695
RELEVANT
RELEASES  : 7.0, 8

- - -------------------------------------------------------------------------

DESCRIPTION
 mpg123 is a command line mp3 player.
 
 A vulnerability[1] in the way mpg123 handles mp3 files with a bitrate
 of zero may allow attackers to execute arbitrary code using a
 specially crafted mp3 file. This update fixes the problem.


SOLUTION
 All mpg123 users should upgrade.
 
 
 REFERENCES:
 2.http://www.securityfocus.com/bid/6629


UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/mpg123-0.59r-5U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/mpg123-0.59r-5U70_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/mpg123-0.59r-7U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/mpg123-0.59r-7U80_1cl.src.rpm


ADDITIONAL INSTRUCTIONS
 The apt tool can be used to perform RPM packages upgrades:

 - run:                 apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions reagarding the use of apt and upgrade examples 
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en

- - -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at 
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en

- - -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en

- - -------------------------------------------------------------------------
Copyright (c) 2003 Conectiva Inc.
http://www.conectiva.com

- - -------------------------------------------------------------------------
subscribe: conectiva-updates-subscribe@xxxxxxxxxxxxxxxxxxxxxxxxxxx
unsubscribe: conectiva-updates-unsubscribe@xxxxxxxxxxxxxxxxxxxxxxxxxxx
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE/FEGR42jd0JmAcZARAnSFAJ9Drutv2imRuUc9HEN8S/3NDko0OQCggf8H
chBzCJU4IsqphkgEPO1Qs+c=
=jSyq
- -----END PGP SIGNATURE-----

- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via EMail to:
uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Conectiva for the information
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBPxUiX4pao72zK539AQEZHwQAjYI8w8vl4yQq8qtsuKtX1D65dTS+pI+W
iW3/6Z5Yc1q48QkITlG7ZOEQqMDevJ+z0UMtHazi7mduXJVmW5+ac26sjhT8Oi3F
tqOqy7UV+6jdCpEiwAySotVN3n8iTL22041ElbspxDDoZy3rp6qD3lgZmursebfS
oS1xTmWl1CY=
=Tdoa
-----END PGP SIGNATURE-----