---

Advisories: June 14, 2005

Mandriva Linux


Mandriva Linux Security Update Advisory


Package name: gaim
Advisory ID: MDKSA-2005:099
Date: June 14th, 2005
Affected versions: 10.1, 10.2, Corporate 3.0


Problem Description:

More vulnerabilities have been discovered in the gaim IM client.
The first is a remote crash with the Yahoo! protocol
(CAN-2005-1269) and the second is a remote DoS in the MSN protocol
(CAN-2005-1934).

These problems have been corrected in gaim 1.3.1 which is
provided with this update.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1269

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1934


Updated Packages:

Mandrakelinux 10.1:
6e4fcf0213cb1239d68dd516527e8243
10.1/RPMS/gaim-1.3.1-0.1.101mdk.i586.rpm
267ef252ba9947e9b64bde9dddebe21e
10.1/RPMS/gaim-devel-1.3.1-0.1.101mdk.i586.rpm
31e933f06152ce1c6fa9057f1ead1364
10.1/RPMS/gaim-gevolution-1.3.1-0.1.101mdk.i586.rpm
e49e26277de52b0a2e4abbf3bceb2742
10.1/RPMS/gaim-perl-1.3.1-0.1.101mdk.i586.rpm
9c8065be22410ada3a470d95a844d881
10.1/RPMS/gaim-tcl-1.3.1-0.1.101mdk.i586.rpm
9aa758d669e32efdd1f0584f77f9f55d
10.1/RPMS/libgaim-remote0-1.3.1-0.1.101mdk.i586.rpm
66f4c7bcee4faf74c2ba012cd7ba289f
10.1/RPMS/libgaim-remote0-devel-1.3.1-0.1.101mdk.i586.rpm
7fc91e876195bb1257ff5b428e306fdf
10.1/SRPMS/gaim-1.3.1-0.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
9876d97be01fe46772f8f80ce28f5ccf
x86_64/10.1/RPMS/gaim-1.3.1-0.1.101mdk.x86_64.rpm
49750a6aa86e6e09dc16f2317f7e0062
x86_64/10.1/RPMS/gaim-devel-1.3.1-0.1.101mdk.x86_64.rpm
3ba1aaa598b1a90d2d7dfea3bd744d9e
x86_64/10.1/RPMS/gaim-gevolution-1.3.1-0.1.101mdk.x86_64.rpm
cb7ef50532ea094e4cf0ebe707931740
x86_64/10.1/RPMS/gaim-perl-1.3.1-0.1.101mdk.x86_64.rpm
2110f664d1c4e4c3dfcf84c3696b60d3
x86_64/10.1/RPMS/gaim-tcl-1.3.1-0.1.101mdk.x86_64.rpm
178bd8ac319f10604b8327790743526f
x86_64/10.1/RPMS/lib64gaim-remote0-1.3.1-0.1.101mdk.x86_64.rpm
db568bc151eb0b6211344c7608dd6099
x86_64/10.1/RPMS/lib64gaim-remote0-devel-1.3.1-0.1.101mdk.x86_64.rpm

7fc91e876195bb1257ff5b428e306fdf
x86_64/10.1/SRPMS/gaim-1.3.1-0.1.101mdk.src.rpm

Mandrakelinux 10.2:
72bed53f4a863d4bb3e7515d7a30adef
10.2/RPMS/gaim-1.3.1-0.1.102mdk.i586.rpm
9a5ee47f3921ea57a6d3385c60379186
10.2/RPMS/gaim-devel-1.3.1-0.1.102mdk.i586.rpm
66ba156f6e65011761ddfca073e6dc94
10.2/RPMS/gaim-gevolution-1.3.1-0.1.102mdk.i586.rpm
1426070274bafd55bdc3eadea2ebfa3a
10.2/RPMS/gaim-perl-1.3.1-0.1.102mdk.i586.rpm
3b77402203fa59aa449b046a7c58749d
10.2/RPMS/gaim-silc-1.3.1-0.1.102mdk.i586.rpm
1115565b2f2ba8505c9012ef472b35b8
10.2/RPMS/gaim-tcl-1.3.1-0.1.102mdk.i586.rpm
af6689ae3b55c35dbd2823b2a7474016
10.2/RPMS/libgaim-remote0-1.3.1-0.1.102mdk.i586.rpm
5d9bb26bca7d190dfa4f138621a85edf
10.2/RPMS/libgaim-remote0-devel-1.3.1-0.1.102mdk.i586.rpm
9f397d2a338771fdf24f9d37ce55fd85
10.2/SRPMS/gaim-1.3.1-0.1.102mdk.src.rpm

Mandrakelinux 10.2/X86_64:
4189d6699c1a05c97b170e81d549f8ea
x86_64/10.2/RPMS/gaim-1.3.1-0.1.102mdk.x86_64.rpm
0a235252f3509b3c3dc15d71482f39b0
x86_64/10.2/RPMS/gaim-devel-1.3.1-0.1.102mdk.x86_64.rpm
4ed3e16d23379d1a87474d4712671357
x86_64/10.2/RPMS/gaim-gevolution-1.3.1-0.1.102mdk.x86_64.rpm
0d604302e4abd887e5bf4b46d4ab19d1
x86_64/10.2/RPMS/gaim-perl-1.3.1-0.1.102mdk.x86_64.rpm
d115b6f98c2c93658810ed35aa54e108
x86_64/10.2/RPMS/gaim-silc-1.3.1-0.1.102mdk.x86_64.rpm
88ad11a13f42cc093728061437c7de86
x86_64/10.2/RPMS/gaim-tcl-1.3.1-0.1.102mdk.x86_64.rpm
21e357632a07cc8e8fbcf280384d3642
x86_64/10.2/RPMS/lib64gaim-remote0-1.3.1-0.1.102mdk.x86_64.rpm
f0971fdfda8337897dfbfb9e0ee04fdb
x86_64/10.2/RPMS/lib64gaim-remote0-devel-1.3.1-0.1.102mdk.x86_64.rpm

9f397d2a338771fdf24f9d37ce55fd85
x86_64/10.2/SRPMS/gaim-1.3.1-0.1.102mdk.src.rpm

Corporate 3.0:
ad4c433c3a75e8b4b24eb0a66caca44f
corporate/3.0/RPMS/gaim-1.3.1-0.1.C30mdk.i586.rpm
8e279142cc357b43a8c58a3c73ac9b5e
corporate/3.0/RPMS/gaim-devel-1.3.1-0.1.C30mdk.i586.rpm
661dea400ea206801c3a4434154405b7
corporate/3.0/RPMS/gaim-perl-1.3.1-0.1.C30mdk.i586.rpm
93090aa5d4a50e578824af9f3a5d4995
corporate/3.0/RPMS/gaim-tcl-1.3.1-0.1.C30mdk.i586.rpm
9fff14e865ab7667b6a03c7bb406f32b
corporate/3.0/RPMS/libgaim-remote0-1.3.1-0.1.C30mdk.i586.rpm
067375646e00fb20ab7a2c9b2e48a951
corporate/3.0/RPMS/libgaim-remote0-devel-1.3.1-0.1.C30mdk.i586.rpm

92a5283dc08a218a563df01b1c6dbe4a
corporate/3.0/SRPMS/gaim-1.3.1-0.1.C30mdk.src.rpm

Corporate 3.0/X86_64:
bf58aaf15a384a62ccdeeac89316e0b9
x86_64/corporate/3.0/RPMS/gaim-1.3.1-0.1.C30mdk.x86_64.rpm
6539c1d78d9c17c05d33c44036adc1fe
x86_64/corporate/3.0/RPMS/gaim-devel-1.3.1-0.1.C30mdk.x86_64.rpm

fa92889caa8ce98b40598f0a5e8d12e9
x86_64/corporate/3.0/RPMS/gaim-perl-1.3.1-0.1.C30mdk.x86_64.rpm
0114367256677963d91e09bffe9bed2f
x86_64/corporate/3.0/RPMS/gaim-tcl-1.3.1-0.1.C30mdk.x86_64.rpm
8d66f38ed47ae7e5dc093c2086f414de
x86_64/corporate/3.0/RPMS/lib64gaim-remote0-1.3.1-0.1.C30mdk.x86_64.rpm

fd52dd04761c70fc9a34bd080f60fa9f
x86_64/corporate/3.0/RPMS/lib64gaim-remote0-devel-1.3.1-0.1.C30mdk.x86_64.rpm

92a5283dc08a218a563df01b1c6dbe4a
x86_64/corporate/3.0/SRPMS/gaim-1.3.1-0.1.C30mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>


Mandriva Linux Security Update Advisory


Package name: rsh
Advisory ID: MDKSA-2005:100
Date: June 14th, 2005
Affected versions: 10.0, 10.1, 10.2, Corporate 3.0, Corporate
Server 2.1


Problem Description:

A vulnerability in the rcp protocol was discovered that allows a
server to instruct a client to write arbitrary files outside of the
current directory, which could potentially be a security concern if
a user used rcp to copy files from a malicious server.

The updated packages have been patched to correct this
problem.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0175


Updated Packages:

Mandrakelinux 10.0:
5e6f513e437cc9a5a619f323509ca58a
10.0/RPMS/rsh-0.17-13.1.100mdk.i586.rpm
aec49c478c37577b6fd795bd9bb4ba67
10.0/RPMS/rsh-server-0.17-13.1.100mdk.i586.rpm
259dcd458b33d1de12d172e876366165
10.0/SRPMS/rsh-0.17-13.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
fd2d00b91971f0b137696c0ca256b94a
amd64/10.0/RPMS/rsh-0.17-13.1.100mdk.amd64.rpm
81fffa62d628599cee1f7b590ae4c38e
amd64/10.0/RPMS/rsh-server-0.17-13.1.100mdk.amd64.rpm
259dcd458b33d1de12d172e876366165
amd64/10.0/SRPMS/rsh-0.17-13.1.100mdk.src.rpm

Mandrakelinux 10.1:
de740985b0e213128f8639e3af831b5e
10.1/RPMS/rsh-0.17-13.1.101mdk.i586.rpm
ff6873ae461a9a12e6a2aeee30a80aa0
10.1/RPMS/rsh-server-0.17-13.1.101mdk.i586.rpm
2a5d801cdedfa0b0b588d340b79c9473
10.1/SRPMS/rsh-0.17-13.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
716ae1dc777924d462d9c502238bda9e
x86_64/10.1/RPMS/rsh-0.17-13.1.101mdk.x86_64.rpm
23ea2409d82a32918e5e132d8e1fff90
x86_64/10.1/RPMS/rsh-server-0.17-13.1.101mdk.x86_64.rpm
2a5d801cdedfa0b0b588d340b79c9473
x86_64/10.1/SRPMS/rsh-0.17-13.1.101mdk.src.rpm

Mandrakelinux 10.2:
381a2b0e1418a14b618030f27ac445ea
10.2/RPMS/rsh-0.17-13.1.102mdk.i586.rpm
d750e7ffcf28e7530e19a294ca9d6bc7
10.2/RPMS/rsh-server-0.17-13.1.102mdk.i586.rpm
1b576319abe603cfaa12d8ee3e314b0d
10.2/SRPMS/rsh-0.17-13.1.102mdk.src.rpm

Mandrakelinux 10.2/X86_64:
7d9fd388f7fefa1e454b9d938befcfdc
x86_64/10.2/RPMS/rsh-0.17-13.1.102mdk.x86_64.rpm
decb83a56d54b9d6310f4e1f2aefe555
x86_64/10.2/RPMS/rsh-server-0.17-13.1.102mdk.x86_64.rpm
1b576319abe603cfaa12d8ee3e314b0d
x86_64/10.2/SRPMS/rsh-0.17-13.1.102mdk.src.rpm

Corporate Server 2.1:
a63459af04b29923eff1606742eb9ce4
corporate/2.1/RPMS/rsh-0.17-9.1.C21mdk.i586.rpm
b655300455ec6bd0fb8c782cfbcbe281
corporate/2.1/RPMS/rsh-server-0.17-9.1.C21mdk.i586.rpm
c828642735f509a405e4582b9f6f3a29
corporate/2.1/SRPMS/rsh-0.17-9.1.C21mdk.src.rpm

Corporate Server 2.1/X86_64:
14219e4f9ada6336f7b26a86881942e2
x86_64/corporate/2.1/RPMS/rsh-0.17-9.1.C21mdk.x86_64.rpm
c32ccf5751017c29817fdd485c489f4b
x86_64/corporate/2.1/RPMS/rsh-server-0.17-9.1.C21mdk.x86_64.rpm
c828642735f509a405e4582b9f6f3a29
x86_64/corporate/2.1/SRPMS/rsh-0.17-9.1.C21mdk.src.rpm

Corporate 3.0:
b20aa1eb70c7bfc006c0c946601c9596
corporate/3.0/RPMS/rsh-0.17-13.1.C30mdk.i586.rpm
7ae577ac25ff29385f99516abd79baaf
corporate/3.0/RPMS/rsh-server-0.17-13.1.C30mdk.i586.rpm
c6fac5847bb6c80b8c92a22750d1c438
corporate/3.0/SRPMS/rsh-0.17-13.1.C30mdk.src.rpm

Corporate 3.0/X86_64:
37a7576122ea4001257e11d034100c28
x86_64/corporate/3.0/RPMS/rsh-0.17-13.1.C30mdk.x86_64.rpm
f7e9c14163f5a56b29fc2b17ae172bfb
x86_64/corporate/3.0/RPMS/rsh-server-0.17-13.1.C30mdk.x86_64.rpm

c6fac5847bb6c80b8c92a22750d1c438
x86_64/corporate/3.0/SRPMS/rsh-0.17-13.1.C30mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>

Red Hat Linux


Red Hat Security Advisory

Synopsis: Low: squid security update
Advisory ID: RHSA-2005:415-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-415.html

Issue date: 2005-06-14
Updated on: 2005-06-14
Product: Red Hat Enterprise Linux
CVE Names: CVE-1999-0710 CAN-2005-0626 CAN-2005-0718 CAN-2005-1345
CAN-2005-1519


1. Summary:

An updated squid package that fixes several security issues is
now available.

This update has been rated as having low security impact by the
Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Desktop version 3 – i386, x86_64
Red Hat Enterprise Linux ES version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 – i386, x86_64
Red Hat Enterprise Linux ES version 4 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 – i386, ia64, x86_64

3. Problem description:

Squid is a full-featured Web proxy cache.

A race condition bug was found in the way Squid handles the now
obsolete Set-Cookie header. It is possible that Squid can leak
Set-Cookie header information to other clients connecting to Squid.
The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name
CAN-2005-0626 to this issue. Please note that this issue only
affected Red Hat Enterprise Linux 4.

A bug was found in the way Squid handles PUT and POST requests.
It is possible for an authorised remote user to cause a failed PUT
or POST request which can cause Squid to crash. The Common
Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name
CAN-2005-0718 to this issue.

A bug was found in the way Squid processes errors in the access
control list. It is possible that an error in the access control
list could give users more access than intended. The Common
Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name
CAN-2005-1345 to this issue.

A bug was found in the way Squid handles access to the
cachemgr.cgi script. It is possible for an authorised remote user
to bypass access control lists with this flaw. The Common
Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name
CVE-1999-0710 to this issue.

A bug was found in the way Squid handles DNS replies. If the
port Squid uses for DNS requests is not protected by a firewall it
is possible for a remote attacker to spoof DNS replies, possibly
redirecting a user to spoofed or malicious content. The Common
Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name
CAN-2005-1519 to this issue.

Additionally this update fixes the following bugs:

  • LDAP Authentication fails with an assertion error when using
    Red Hat Enterprise Linux 4

Users of Squid should upgrade to this updated package, which
contains backported patches to correct these issues.

4. Solution:

Before applying this update, make sure that all
previously-released errata relevant to your system have been
applied. Use Red Hat Network to download and update your packages.
To launch the Red Hat Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to
the following Web page for the System Administration or
Customization guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

125007 – insecure permissions for squid.conf
150232 – CAN-2005-0626 Cookie leak in squid
150907 – LDAP Authentication fails with an assertion error.
151412 – CAN-2005-1345 Unexpected access control results on
configuration errors
151423 – CAN-2005-0718 Segmentation fault on failed PUT/POST
request
156161 – CVE-1999-0710 cachemgr.cgi access control bypass
157455 – CAN-2005-1519 DNS lookups unreliable on untrusted
networks

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.13.src.rpm

5acdf1c36158278b905d566601fc409d
squid-2.5.STABLE3-6.3E.13.src.rpm

i386:
121f2f66e89bd7f6ab9f6bd396d3b1c5
squid-2.5.STABLE3-6.3E.13.i386.rpm

ia64:
326a07470e64ddaede76db3fca69ad93
squid-2.5.STABLE3-6.3E.13.ia64.rpm

ppc:
6a1408441098eda8f37a993e44c83e96
squid-2.5.STABLE3-6.3E.13.ppc.rpm

s390:
306bceb6f65ddda1834f8cf6213477c0
squid-2.5.STABLE3-6.3E.13.s390.rpm

s390x:
2dad89a53be0e33822439b101605a8a9
squid-2.5.STABLE3-6.3E.13.s390x.rpm

x86_64:
17e33e76a87a7eacd79d67d14e64f159
squid-2.5.STABLE3-6.3E.13.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/squid-2.5.STABLE3-6.3E.13.src.rpm

5acdf1c36158278b905d566601fc409d
squid-2.5.STABLE3-6.3E.13.src.rpm

i386:
121f2f66e89bd7f6ab9f6bd396d3b1c5
squid-2.5.STABLE3-6.3E.13.i386.rpm

x86_64:
17e33e76a87a7eacd79d67d14e64f159
squid-2.5.STABLE3-6.3E.13.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/squid-2.5.STABLE3-6.3E.13.src.rpm

5acdf1c36158278b905d566601fc409d
squid-2.5.STABLE3-6.3E.13.src.rpm

i386:
121f2f66e89bd7f6ab9f6bd396d3b1c5
squid-2.5.STABLE3-6.3E.13.i386.rpm

ia64:
326a07470e64ddaede76db3fca69ad93
squid-2.5.STABLE3-6.3E.13.ia64.rpm

x86_64:
17e33e76a87a7eacd79d67d14e64f159
squid-2.5.STABLE3-6.3E.13.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.13.src.rpm

5acdf1c36158278b905d566601fc409d
squid-2.5.STABLE3-6.3E.13.src.rpm

i386:
121f2f66e89bd7f6ab9f6bd396d3b1c5
squid-2.5.STABLE3-6.3E.13.i386.rpm

ia64:
326a07470e64ddaede76db3fca69ad93
squid-2.5.STABLE3-6.3E.13.ia64.rpm

x86_64:
17e33e76a87a7eacd79d67d14e64f159
squid-2.5.STABLE3-6.3E.13.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/squid-2.5.STABLE6-3.4E.9.src.rpm

a88dc1ec45757634cef354dfef2d52a4
squid-2.5.STABLE6-3.4E.9.src.rpm

i386:
856d86205323f1f130d0316b1daf5bfb
squid-2.5.STABLE6-3.4E.9.i386.rpm

ia64:
8e7b8c002fe66d28432b4c36c8080b68
squid-2.5.STABLE6-3.4E.9.ia64.rpm

ppc:
4dde85c3f7fcb7ed70cbdd8bd861188b
squid-2.5.STABLE6-3.4E.9.ppc.rpm

s390:
1af698055b4e6ffba098d7403f7dfb83
squid-2.5.STABLE6-3.4E.9.s390.rpm

s390x:
1ae7aa278436d2a812ab4a5fbcd2476d
squid-2.5.STABLE6-3.4E.9.s390x.rpm

x86_64:
f98092aaa7d0fb733ca59f2d55f938e5
squid-2.5.STABLE6-3.4E.9.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/squid-2.5.STABLE6-3.4E.9.src.rpm

a88dc1ec45757634cef354dfef2d52a4
squid-2.5.STABLE6-3.4E.9.src.rpm

i386:
856d86205323f1f130d0316b1daf5bfb
squid-2.5.STABLE6-3.4E.9.i386.rpm

x86_64:
f98092aaa7d0fb733ca59f2d55f938e5
squid-2.5.STABLE6-3.4E.9.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/squid-2.5.STABLE6-3.4E.9.src.rpm

a88dc1ec45757634cef354dfef2d52a4
squid-2.5.STABLE6-3.4E.9.src.rpm

i386:
856d86205323f1f130d0316b1daf5bfb
squid-2.5.STABLE6-3.4E.9.i386.rpm

ia64:
8e7b8c002fe66d28432b4c36c8080b68
squid-2.5.STABLE6-3.4E.9.ia64.rpm

x86_64:
f98092aaa7d0fb733ca59f2d55f938e5
squid-2.5.STABLE6-3.4E.9.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/squid-2.5.STABLE6-3.4E.9.src.rpm

a88dc1ec45757634cef354dfef2d52a4
squid-2.5.STABLE6-3.4E.9.src.rpm

i386:
856d86205323f1f130d0316b1daf5bfb
squid-2.5.STABLE6-3.4E.9.i386.rpm

ia64:
8e7b8c002fe66d28432b4c36c8080b68
squid-2.5.STABLE6-3.4E.9.ia64.rpm

x86_64:
f98092aaa7d0fb733ca59f2d55f938e5
squid-2.5.STABLE6-3.4E.9.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key
and details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0710

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0626

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0718

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1345

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1519

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More
contact details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.


Red Hat Security Advisory

Synopsis: Moderate: telnet security update
Advisory ID: RHSA-2005:504-00
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-504.html

Issue date: 2005-06-14
Updated on: 2005-06-14
Product: Red Hat Enterprise Linux
Obsoletes: RHSA-2005:327
CVE Names: CAN-2005-0488


1. Summary:

Updated telnet packages that fix an information disclosure issue
are now available.

This update has been rated as having moderate security impact by
the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 –
i386, ia64
Red Hat Linux Advanced Workstation 2.1 – ia64
Red Hat Enterprise Linux ES version 2.1 – i386
Red Hat Enterprise Linux WS version 2.1 – i386
Red Hat Enterprise Linux AS version 3 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Desktop version 3 – i386, x86_64
Red Hat Enterprise Linux ES version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 – i386, x86_64
Red Hat Enterprise Linux ES version 4 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 – i386, ia64, x86_64

3. Problem description:

The telnet package provides a command line telnet client.

Gael Delalleau discovered an information disclosure issue in the
way the telnet client handles messages from a server. An attacker
could construct a malicious telnet server that collects information
from the environment of any victim who connects to it. The Common
Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name
CAN-2005-0488 to this issue.

Users of telnet should upgrade to this updated package, which
contains a backported patch to correct this issue.

4. Solution:

Before applying this update, make sure all previously released
errata relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat
Network, launch the Red Hat Update Agent with the following
command:

up2date

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

159297 – CAN-2005-0488 telnet Information Disclosure
Vulnerability

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:

ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/telnet-0.17-20.EL2.4.src.rpm

29916c3c5d489abe67b924e5632eb181
telnet-0.17-20.EL2.4.src.rpm

i386:
c60a0c2b5f95fce95ca50bff53026acf
telnet-0.17-20.EL2.4.i386.rpm
a058fc85f4236cb0c636159aa7d633ce

telnet-server-0.17-20.EL2.4.i386.rpm

ia64:
5b47dc975fa30ec5cd2ca87688d88a75
telnet-0.17-20.EL2.4.ia64.rpm
dfcb49651938529dc80948e6b2e590ac

telnet-server-0.17-20.EL2.4.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:

ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/telnet-0.17-20.EL2.4.src.rpm

29916c3c5d489abe67b924e5632eb181
telnet-0.17-20.EL2.4.src.rpm

ia64:
5b47dc975fa30ec5cd2ca87688d88a75
telnet-0.17-20.EL2.4.ia64.rpm
dfcb49651938529dc80948e6b2e590ac

telnet-server-0.17-20.EL2.4.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:

ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/telnet-0.17-20.EL2.4.src.rpm

29916c3c5d489abe67b924e5632eb181
telnet-0.17-20.EL2.4.src.rpm

i386:
c60a0c2b5f95fce95ca50bff53026acf
telnet-0.17-20.EL2.4.i386.rpm
a058fc85f4236cb0c636159aa7d633ce

telnet-server-0.17-20.EL2.4.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:

ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/telnet-0.17-20.EL2.4.src.rpm

29916c3c5d489abe67b924e5632eb181
telnet-0.17-20.EL2.4.src.rpm

i386:
c60a0c2b5f95fce95ca50bff53026acf
telnet-0.17-20.EL2.4.i386.rpm
a058fc85f4236cb0c636159aa7d633ce

telnet-server-0.17-20.EL2.4.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/telnet-0.17-26.EL3.3.src.rpm

683f3a6fae5f0b9b43249390527a79cc
telnet-0.17-26.EL3.3.src.rpm

i386:
cda1f619d2f864c113e068e616c65530
telnet-0.17-26.EL3.3.i386.rpm
f40313804ebecab1cf57b4531af1e5e7

telnet-server-0.17-26.EL3.3.i386.rpm

ia64:
9f3533a862605330846e18d41705ed74
telnet-0.17-26.EL3.3.ia64.rpm
3cc79bf807d6c0ef2c88be4a9b11797f

telnet-server-0.17-26.EL3.3.ia64.rpm

ppc:
1f8614267bf84b13cafdae5c2f71efdf
telnet-0.17-26.EL3.3.ppc.rpm
71a2ff5505d6b3c3ad73322e4f6d7d12

telnet-server-0.17-26.EL3.3.ppc.rpm

s390:
041ae907bd1b00bcd556d4599c330334
telnet-0.17-26.EL3.3.s390.rpm
22d56448d6f29cfdbf89aff0c04f994e

telnet-server-0.17-26.EL3.3.s390.rpm

s390x:
4a75669c15e077bde8d67fef617bd3e7
telnet-0.17-26.EL3.3.s390x.rpm
bcf68468a636a170d6f9897d5b4693b4

telnet-server-0.17-26.EL3.3.s390x.rpm

x86_64:
83d8e20716ce1d6d98600fe29195713d
telnet-0.17-26.EL3.3.x86_64.rpm
560945441fdcefa6ceedb38ddf2f8869

telnet-server-0.17-26.EL3.3.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/telnet-0.17-26.EL3.3.src.rpm

683f3a6fae5f0b9b43249390527a79cc
telnet-0.17-26.EL3.3.src.rpm

i386:
cda1f619d2f864c113e068e616c65530
telnet-0.17-26.EL3.3.i386.rpm
f40313804ebecab1cf57b4531af1e5e7

telnet-server-0.17-26.EL3.3.i386.rpm

x86_64:
83d8e20716ce1d6d98600fe29195713d
telnet-0.17-26.EL3.3.x86_64.rpm
560945441fdcefa6ceedb38ddf2f8869

telnet-server-0.17-26.EL3.3.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/telnet-0.17-26.EL3.3.src.rpm

683f3a6fae5f0b9b43249390527a79cc
telnet-0.17-26.EL3.3.src.rpm

i386:
cda1f619d2f864c113e068e616c65530
telnet-0.17-26.EL3.3.i386.rpm
f40313804ebecab1cf57b4531af1e5e7

telnet-server-0.17-26.EL3.3.i386.rpm

ia64:
9f3533a862605330846e18d41705ed74
telnet-0.17-26.EL3.3.ia64.rpm
3cc79bf807d6c0ef2c88be4a9b11797f

telnet-server-0.17-26.EL3.3.ia64.rpm

x86_64:
83d8e20716ce1d6d98600fe29195713d
telnet-0.17-26.EL3.3.x86_64.rpm
560945441fdcefa6ceedb38ddf2f8869

telnet-server-0.17-26.EL3.3.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/telnet-0.17-26.EL3.3.src.rpm

683f3a6fae5f0b9b43249390527a79cc
telnet-0.17-26.EL3.3.src.rpm

i386:
cda1f619d2f864c113e068e616c65530
telnet-0.17-26.EL3.3.i386.rpm
f40313804ebecab1cf57b4531af1e5e7

telnet-server-0.17-26.EL3.3.i386.rpm

ia64:
9f3533a862605330846e18d41705ed74
telnet-0.17-26.EL3.3.ia64.rpm
3cc79bf807d6c0ef2c88be4a9b11797f

telnet-server-0.17-26.EL3.3.ia64.rpm

x86_64:
83d8e20716ce1d6d98600fe29195713d
telnet-0.17-26.EL3.3.x86_64.rpm
560945441fdcefa6ceedb38ddf2f8869

telnet-server-0.17-26.EL3.3.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/telnet-0.17-31.EL4.3.src.rpm

1afaad8fd9a0ca90f633f8b3d92dcac9
telnet-0.17-31.EL4.3.src.rpm

i386:
f7e6d78d44ea95b7354b153299917a48
telnet-0.17-31.EL4.3.i386.rpm
d8a97db3761f4c061abe9d33a6a55957

telnet-server-0.17-31.EL4.3.i386.rpm

ia64:
757b16c60d7a14c79e4db0da16f54611
telnet-0.17-31.EL4.3.ia64.rpm
1a61e1b55a96709364e4212c64004708

telnet-server-0.17-31.EL4.3.ia64.rpm

ppc:
ab9af8408934a5c90732752c237fb534
telnet-0.17-31.EL4.3.ppc.rpm
079055dcc0cb9a6ab3a8bbcca0c1d208

telnet-server-0.17-31.EL4.3.ppc.rpm

s390:
3498586b518d408a50b71c6c2f9f88c6
telnet-0.17-31.EL4.3.s390.rpm
3cb3275401f0aac567809d42260bfa82

telnet-server-0.17-31.EL4.3.s390.rpm

s390x:
961257885dbc8ba17b51a335b34085a9
telnet-0.17-31.EL4.3.s390x.rpm
081b087c92b4a01d9e28a5ce7ff9f30b

telnet-server-0.17-31.EL4.3.s390x.rpm

x86_64:
e4061ad47ef737849aa2736328514861
telnet-0.17-31.EL4.3.x86_64.rpm
99c89bb6f1663db0abe2aaabea2d1402

telnet-server-0.17-31.EL4.3.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/telnet-0.17-31.EL4.3.src.rpm

1afaad8fd9a0ca90f633f8b3d92dcac9
telnet-0.17-31.EL4.3.src.rpm

i386:
f7e6d78d44ea95b7354b153299917a48
telnet-0.17-31.EL4.3.i386.rpm
d8a97db3761f4c061abe9d33a6a55957

telnet-server-0.17-31.EL4.3.i386.rpm

x86_64:
e4061ad47ef737849aa2736328514861
telnet-0.17-31.EL4.3.x86_64.rpm
99c89bb6f1663db0abe2aaabea2d1402

telnet-server-0.17-31.EL4.3.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/telnet-0.17-31.EL4.3.src.rpm

1afaad8fd9a0ca90f633f8b3d92dcac9
telnet-0.17-31.EL4.3.src.rpm

i386:
f7e6d78d44ea95b7354b153299917a48
telnet-0.17-31.EL4.3.i386.rpm
d8a97db3761f4c061abe9d33a6a55957

telnet-server-0.17-31.EL4.3.i386.rpm

ia64:
757b16c60d7a14c79e4db0da16f54611
telnet-0.17-31.EL4.3.ia64.rpm
1a61e1b55a96709364e4212c64004708

telnet-server-0.17-31.EL4.3.ia64.rpm

x86_64:
e4061ad47ef737849aa2736328514861
telnet-0.17-31.EL4.3.x86_64.rpm
99c89bb6f1663db0abe2aaabea2d1402

telnet-server-0.17-31.EL4.3.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/telnet-0.17-31.EL4.3.src.rpm

1afaad8fd9a0ca90f633f8b3d92dcac9
telnet-0.17-31.EL4.3.src.rpm

i386:
f7e6d78d44ea95b7354b153299917a48
telnet-0.17-31.EL4.3.i386.rpm
d8a97db3761f4c061abe9d33a6a55957

telnet-server-0.17-31.EL4.3.i386.rpm

ia64:
757b16c60d7a14c79e4db0da16f54611
telnet-0.17-31.EL4.3.ia64.rpm
1a61e1b55a96709364e4212c64004708

telnet-server-0.17-31.EL4.3.ia64.rpm

x86_64:
e4061ad47ef737849aa2736328514861
telnet-0.17-31.EL4.3.x86_64.rpm
99c89bb6f1663db0abe2aaabea2d1402

telnet-server-0.17-31.EL4.3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key
and details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0488

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More
contact details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis