lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1H6d10-0002dJ-5J@artemis.annvix.ca>
Date: Mon, 15 Jan 2007 18:21:30 -0700
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:017 ] - Updated wget packages fix
	ftp vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:017
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : wget
 Date    : January 15, 2007
 Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF)
 GNU wget 1.10.2 allows remote attackers to cause a denial of service
 (application crash) via a malicious FTP server with a large number of
 blank 220 responses to the SYST command.

 The updated packages have been patched to correct this problem.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6719
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 8f5fbe5fa003b203c5be4f65c72eafef  2006.0/i586/wget-1.10-1.2.20060mdk.i586.rpm 
 7bbe865186503532dc5fa194240167c0  2006.0/SRPMS/wget-1.10-1.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 a70b537b39d5397cb142b20bba55b6f5  2006.0/x86_64/wget-1.10-1.2.20060mdk.x86_64.rpm 
 7bbe865186503532dc5fa194240167c0  2006.0/SRPMS/wget-1.10-1.2.20060mdk.src.rpm

 Mandriva Linux 2007.0:
 c6331e96c0180a6fb364c4dd0d824bad  2007.0/i586/wget-1.10.2-3.1mdv2007.0.i586.rpm 
 53d0cfe5e83b5126d89963611dbe0196  2007.0/SRPMS/wget-1.10.2-3.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 b7826d019cb0bd54c8f59007566db782  2007.0/x86_64/wget-1.10.2-3.1mdv2007.0.x86_64.rpm 
 53d0cfe5e83b5126d89963611dbe0196  2007.0/SRPMS/wget-1.10.2-3.1mdv2007.0.src.rpm

 Corporate 3.0:
 485d33aa6d44eedd9ae0fa41e6e1159d  corporate/3.0/i586/wget-1.9.1-4.4.C30mdk.i586.rpm 
 6765dc9c586b7520a87e619095475a9b  corporate/3.0/SRPMS/wget-1.9.1-4.4.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 4c64e7dfc485a04c4fd38d6f492d7e34  corporate/3.0/x86_64/wget-1.9.1-4.4.C30mdk.x86_64.rpm 
 6765dc9c586b7520a87e619095475a9b  corporate/3.0/SRPMS/wget-1.9.1-4.4.C30mdk.src.rpm

 Corporate 4.0:
 8050181ba71182203403e7d3b12b7922  corporate/4.0/i586/wget-1.10-1.2.20060mlcs4.i586.rpm 
 730e722809170908e017844728f87c86  corporate/4.0/SRPMS/wget-1.10-1.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 0be58a7ab8d999489b311fa12bf2e5d4  corporate/4.0/x86_64/wget-1.10-1.2.20060mlcs4.x86_64.rpm 
 730e722809170908e017844728f87c86  corporate/4.0/SRPMS/wget-1.10-1.2.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 31945b27c8a8777a7c2c55bbf12eff73  mnf/2.0/i586/wget-1.9.1-4.4.M20mdk.i586.rpm 
 6c94e26ee057c849a1a4f01b6777f818  mnf/2.0/SRPMS/wget-1.9.1-4.4.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFq/x+mqjQ0CJFipgRAnAiAJ47ZEJJrBiYZ74Z5I8nRNQjrRWj2wCfbSH1
FdqJ7ySHKajIZHxZqVbozx8=
=DZk/
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ