Linux Security
    Linux Security
    Linux Security

    Debian: 'ucd-snmp' Multiple remote vulnerabilities

    Date
    2586
    Posted By
    These packages prevent possible denial of service attacks andsecurity breaches as discovered by the Oulu University Secure Programming Group.
    
    ------------------------------------------------------------------------
    Debian Security Advisory DSA-111-1                   This email address is being protected from spambots. You need JavaScript enabled to view it. 
    https://www.debian.org/security/                         Wichert Akkerman
    February 14, 2002
    ------------------------------------------------------------------------
    
    
    Package        : ucd-snmp
    Problem type   : remote exploit
    Debian-specific: no
    CERT Advisory  : CA-2002-03
    
    The Secure Programming Group of the Oulu University did a study on
    SNMP implementations and uncovered multiple problems which can
    cause problems ranging from Denial of Service attacks to remote
    exploits.
    
    New UCD-SNMP packages have been prepared to fix these problems
    as well as a few others. The complete list of fixed problems is:
    
    * When running external programs snmpd used temporary files insecurely
    * snmpd did not properly reset supplementary groups after changing
      its uid and gid
    * Modified most code to use buffers instead of fixed-length strings to
      prevent buffer overflows
    * The ASN.1 parser did not check for negative lengths
    * the IFINDEX response handling in snmpnetstat did not do a sanity check
      on its input
    
    (thanks to Caldera for most of the work on those patches)
    
    The new version is 4.1.1-2.1 and we recommend you upgrade your
    snmp packages immediately.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    
    Debian GNU/Linux 2.2 alias potato
    ---------------------------------
    
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
    
      Source archives:
         https://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1-2.1.diff.gz
          MD5 checksum: 96ef7f9946c3a10f100744fdc5482418
         https://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1-2.1.dsc
          MD5 checksum: 03bc1ccf1a22e436a78c3e5a1ad4eefa
         https://security.debian.org/dists/stable/updates/main/source/ucd-snmp_4.1.1.orig.tar.gz
          MD5 checksum: 2f0d6130af510a8ce283dfdb557a85fa
    
      Alpha architecture:
         
    https://security.debian.org/dists/stable/updates/main/binary-alpha/libsnmp4.1-dev_4.1.1-2.1_alpha.deb
          MD5 checksum: e6cbb17f5295e4e663bee8369b2cf419
         
    https://security.debian.org/dists/stable/updates/main/binary-alpha/libsnmp4.1_4.1.1-2.1_alpha.deb
          MD5 checksum: 31c67fca601af32915020f5ce67f74cf
         https://security.debian.org/dists/stable/updates/main/binary-alpha/snmp_4.1.1-2.1_alpha.deb
          MD5 checksum: 0a82614ab42742528f9ebf13b8034410
         https://security.debian.org/dists/stable/updates/main/binary-alpha/snmpd_4.1.1-2.1_alpha.deb
          MD5 checksum: 205ab169948ac4c54665adb8dcaa8a67
    
      ARM architecture:
         
    https://security.debian.org/dists/stable/updates/main/binary-arm/libsnmp4.1-dev_4.1.1-2.1_arm.deb
          MD5 checksum: ce4597a66d4bb6a816a859f2792cc62b
         https://security.debian.org/dists/stable/updates/main/binary-arm/libsnmp4.1_4.1.1-2.1_arm.deb
          MD5 checksum: 9e96864263ab5f9489fcea655f1b0a50
         https://security.debian.org/dists/stable/updates/main/binary-arm/snmp_4.1.1-2.1_arm.deb
          MD5 checksum: 2c0361c50cf0f97a77439c0f9c834c17
         https://security.debian.org/dists/stable/updates/main/binary-arm/snmpd_4.1.1-2.1_arm.deb
          MD5 checksum: 48abd58e7399e245c3d3775ab59cbba3
    
      Intel IA-32 architecture:
         
    https://security.debian.org/dists/stable/updates/main/binary-i386/libsnmp4.1-dev_4.1.1-2.1_i386.deb
          MD5 checksum: 5addf966bc067f943b4ca6c7d604a48f
         
    https://security.debian.org/dists/stable/updates/main/binary-i386/libsnmp4.1_4.1.1-2.1_i386.deb
          MD5 checksum: e1ebaeaee18859d1e58aae658e4b1564
         https://security.debian.org/dists/stable/updates/main/binary-i386/snmp_4.1.1-2.1_i386.deb
          MD5 checksum: 7d13633a4e8a922eb36d6bfe8a04f0f3
         https://security.debian.org/dists/stable/updates/main/binary-i386/snmpd_4.1.1-2.1_i386.deb
          MD5 checksum: bb63f353a4e3bba6d0bd3acc54f6a138
    
      Motorola 680x0 architecture:
         
    https://security.debian.org/dists/stable/updates/main/binary-m68k/libsnmp4.1-dev_4.1.1-2.1_m68k.deb
          MD5 checksum: 805cc411f0b7d425275f60ef238773a4
         
    https://security.debian.org/dists/stable/updates/main/binary-m68k/libsnmp4.1_4.1.1-2.1_m68k.deb
          MD5 checksum: 021c14224b260e43276553329dc264f7
         https://security.debian.org/dists/stable/updates/main/binary-m68k/snmp_4.1.1-2.1_m68k.deb
          MD5 checksum: 5a8c55d92c6b721f3e1487ba858eb6e2
         https://security.debian.org/dists/stable/updates/main/binary-m68k/snmpd_4.1.1-2.1_m68k.deb
          MD5 checksum: 411834b9de92101366a7898f880d82eb
    
      PowerPC architecture:
         
    https://security.debian.org/dists/stable/updates/main/binary-powerpc/libsnmp4.1-dev_4.1.1-2.1_powerpc.deb
          MD5 checksum: a7dde01a21e7258b45285924dafd6b70
         
    https://security.debian.org/dists/stable/updates/main/binary-powerpc/libsnmp4.1_4.1.1-2.1_powerpc.deb
          MD5 checksum: a0e037e1fcebb2154fa1f41c65dfb0a8
         
    https://security.debian.org/dists/stable/updates/main/binary-powerpc/snmp_4.1.1-2.1_powerpc.deb
          MD5 checksum: 4510c8dbc86d1acc1fd31a2625b9ebc3
         
    https://security.debian.org/dists/stable/updates/main/binary-powerpc/snmpd_4.1.1-2.1_powerpc.deb
          MD5 checksum: 81acd0406d0166539d1fa61214fe7b59
    
      Sun Sparc architecture:
         
    https://security.debian.org/dists/stable/updates/main/binary-sparc/libsnmp4.1-dev_4.1.1-2.1_sparc.deb
          MD5 checksum: 098021d71b64d77622aaaa4ff0a7502c
         
    https://security.debian.org/dists/stable/updates/main/binary-sparc/libsnmp4.1_4.1.1-2.1_sparc.deb
          MD5 checksum: 1f5702918bfd3704abb82f72b4e9cfe8
         https://security.debian.org/dists/stable/updates/main/binary-sparc/snmp_4.1.1-2.1_sparc.deb
          MD5 checksum: e52aad9099ff709e94820b2bbbfd0ee1
         https://security.debian.org/dists/stable/updates/main/binary-sparc/snmpd_4.1.1-2.1_sparc.deb
          MD5 checksum: 813afcda0149f7a8c193b891320c14fa
    
      These packages will be moved into the stable distribution on its next
      revision.
    
    --
    ----------------------------------------------------------------------------
    apt-get: deb  https://security.debian.org/ stable/updates main
    dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    
    
    

    LinuxSecurity Poll

    I agree with Linus Torvalds - Apple's new M1-powered laptops should run on Linux.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/45-i-agree-with-linus-torvalds-apple-s-new-m1-powered-laptops-should-run-on-linux?task=poll.vote&format=json
    45
    radio
    [{"id":"158","title":"True","votes":"11","type":"x","order":"1","pct":100,"resources":[]},{"id":"159","title":"False","votes":"0","type":"x","order":"2","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.