[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050317174704.GA7785@box79162.elkhouse.de>
From: martin.pitt at canonical.com (Martin Pitt)
Subject: [USN-98-1] OpenSLP vulnerabilities
===========================================================
Ubuntu Security Notice USN-98-1 March 17, 2005
openslp vulnerabilities
http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032534.html
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
libslp1
slpd
The problem can be corrected by upgrading the affected package to
version 1.0.11-7ubuntu0.1. In general, a standard system upgrade is
sufficient to effect the necessary changes.
Details follow:
The SuSE Security Team discovered several buffer overflows in the
OpenSLP server and client library. By sending specially crafted SLP
packets, a remote attacker could exploit this to crash the SLP server
or execute arbitrary code with the privileges of the "daemon" user.
Likewise, a malicious SLP server could exploit the client library
vulnerabilities to execute arbitrary code with the privileges of the
user running the SLP client application.
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/openslp_1.0.11-7ubuntu0.1.diff.gz
Size/MD5: 151039 eb727a65716e86e757e34748aa24cc45
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/openslp_1.0.11-7ubuntu0.1.dsc
Size/MD5: 655 5ff8151d34a2b861a3d9f614072b92ca
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/openslp_1.0.11.orig.tar.gz
Size/MD5: 608138 0ec965956ad1f66850f050b19c828b55
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/openslp-doc_1.0.11-7ubuntu0.1_all.deb
Size/MD5: 95946 dffab2db867d3604939d692ffb3904f7
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp-dev_1.0.11-7ubuntu0.1_amd64.deb
Size/MD5: 65082 9a8acfb6e05f13688bb9d54c85c3593b
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp1_1.0.11-7ubuntu0.1_amd64.deb
Size/MD5: 47610 a536d6a50a6d64453606178ec4f17ef1
http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slpd_1.0.11-7ubuntu0.1_amd64.deb
Size/MD5: 70866 7f52d0fd37f71aec8e1940e1e34a9b63
http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slptool_1.0.11-7ubuntu0.1_amd64.deb
Size/MD5: 26546 44d2d312536407a1c2af16b265d04035
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp-dev_1.0.11-7ubuntu0.1_i386.deb
Size/MD5: 62000 fd04134fb0f1f98c2662d35ff340041d
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp1_1.0.11-7ubuntu0.1_i386.deb
Size/MD5: 45890 d703c3f516e7e67d918579f20c8c45aa
http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slpd_1.0.11-7ubuntu0.1_i386.deb
Size/MD5: 65100 ec67710b0585c62c7142f036256c9853
http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slptool_1.0.11-7ubuntu0.1_i386.deb
Size/MD5: 26086 d83af46fc9e6e9981a6e5c5a1d23fdad
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp-dev_1.0.11-7ubuntu0.1_powerpc.deb
Size/MD5: 66202 ad95b923ad7b89cadb37972ccbe10443
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp1_1.0.11-7ubuntu0.1_powerpc.deb
Size/MD5: 48928 ca8dfeddadab73241b9a3f36c6989e0d
http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slpd_1.0.11-7ubuntu0.1_powerpc.deb
Size/MD5: 72190 08e568c75979eaa01619668b6b68d06b
http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slptool_1.0.11-7ubuntu0.1_powerpc.deb
Size/MD5: 28076 f507323a5ffa3082f34f610f911fd05a
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050317/ef392e6a/attachment.bin
Powered by blists - more mailing lists