---

Advisories: June 15, 2005

Mandriva Linux


Mandriva Linux Security Update Advisory


Package name: tcpdump
Advisory ID: MDKSA-2005:101
Date: June 15th, 2005
Affected versions: 10.1, 10.2


Problem Description:

A Denial of Service vulnerability was found in tcpdump during
the processing of certain network packages. Because of this flaw,
it was possible for an attacker to inject a carefully crafted
packet onto the network which would crash a running tcpdump
session.

The updated packages have been patched to correct this problem.
This problem does not affect at least tcpdump 3.8.1 and
earlier.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1267


Updated Packages:

Mandrakelinux 10.1:
19f997352f3fef16e9809c33a9fd9e6f
10.1/RPMS/tcpdump-3.8.3-2.2.101mdk.i586.rpm
91566ff6914608573f685a750a23e4a2
10.1/SRPMS/tcpdump-3.8.3-2.2.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
23da8b573535902af955c3bc52b8da45
x86_64/10.1/RPMS/tcpdump-3.8.3-2.2.101mdk.x86_64.rpm
91566ff6914608573f685a750a23e4a2
x86_64/10.1/SRPMS/tcpdump-3.8.3-2.2.101mdk.src.rpm

Mandrakelinux 10.2:
317345c2da874d9c8b1333fcf7b0f81a
10.2/RPMS/tcpdump-3.8.3-2.2.102mdk.i586.rpm
c7e1bb066e89aaa17188a9548262aee3
10.2/SRPMS/tcpdump-3.8.3-2.2.102mdk.src.rpm

Mandrakelinux 10.2/X86_64:
49053eec4a4b00732cef1da5405a2ea5
x86_64/10.2/RPMS/tcpdump-3.8.3-2.2.102mdk.x86_64.rpm
c7e1bb066e89aaa17188a9548262aee3
x86_64/10.2/SRPMS/tcpdump-3.8.3-2.2.102mdk.src.rpm


To upgrade automatically use MandrakeUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>

Ubuntu Linux


Ubuntu Security Notice USN-140-1 June 15, 2005
gaim vulnerability
CAN-2005-1934


A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected:

gaim

The problem can be corrected by upgrading the affected package
to version 1:1.0.0-1ubuntu1.6 (for Ubuntu 4.10), or
1:1.1.4-1ubuntu4.3 (for Ubuntu 5.04). After doing a standard system
upgrade you need to restart Gaim to effect the necessary
changes.

Details follow:

A remote Denial of Service vulnerability was discovered in Gaim.
A remote attacker could crash the Gaim client of an MSN user by
sending a specially crafted MSN package which states an invalid
body length in the header.

Updated packages for Ubuntu 4.10 (Warty Warthog):

Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1.6.diff.gz

Size/MD5: 48444 468f68e015435db9a0f7113808c57e58

http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1.6.dsc

Size/MD5: 853 622bcdbdc5066a6596a42ea4ab8f7e22

http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0.orig.tar.gz

Size/MD5: 6985979 7dde686aace751a49dce734fd0cb7ace

amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1.6_amd64.deb

Size/MD5: 3444948 cae0518c1f2fa14f4e838dd46376fde4

i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1.6_i386.deb

Size/MD5: 3355296 bf14bf90ac7a3bebae7891d8142c3a0e

powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.0.0-1ubuntu1.6_powerpc.deb

Size/MD5: 3418564 5becbf0f173331db116136a19522698f

Updated packages for Ubuntu 5.04 (Hoary Hedgehog):

Source archives:


http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.1.4-1ubuntu4.3.diff.gz

Size/MD5: 108334 e8ae93ed55c364fdef75d6afa2888bf1

http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.1.4-1ubuntu4.3.dsc

Size/MD5: 991 4ca52b48cfccb93b4a8c3f3e712a5859

http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.1.4.orig.tar.gz

Size/MD5: 5188552 b55bf3217b271918384f3f015a6e5b62

Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim-data_1.1.4-1ubuntu4.3_all.deb

Size/MD5: 603678 37e36ea56bfd32754f540ae04a929903

amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim-dev_1.1.4-1ubuntu4.3_amd64.deb

Size/MD5: 101624 dd693d77a9fb58eed430e18d38bdb5e7

http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.1.4-1ubuntu4.3_amd64.deb

Size/MD5: 934222 c3a8d7c1fcb1789363ad277acf0cb4c2

i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim-dev_1.1.4-1ubuntu4.3_i386.deb

Size/MD5: 101612 22e78fb3580dc128eeb6e3d2b7491436

http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.1.4-1ubuntu4.3_i386.deb

Size/MD5: 845570 2baab76439b0274b26416cfa3eba3cac

powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim-dev_1.1.4-1ubuntu4.3_powerpc.deb

Size/MD5: 101642 722cbc574f4d128f9806430957828695

http://security.ubuntu.com/ubuntu/pool/main/g/gaim/gaim_1.1.4-1ubuntu4.3_powerpc.deb

Size/MD5: 910476 ef04e16bf2d2dd7aac67bb58173199e0

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis