---

Red Hat Linux Advisories: glibc, nss_ldap, tcpdump


---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Updated glibc packages fix vulnerabilities in resolver
Advisory ID:       RHSA-2002:197-06
Issue date:        2002-09-10
Updated on:        2002-10-03
Product:           Red Hat Linux
Keywords:          glibc resolv DNS
Cross references:  
Obsoletes:         RHSA-2002:166-07
CVE Names:         CAN-2002-1146
---------------------------------------------------------------------

1. Topic:

Updated glibc packages are available to fix a buffer overflow in the
resolver.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - alpha, i386, sparc, sparcv9
Red Hat Linux 7.0 - alpha, alphaev6, i386, i686
Red Hat Linux 7.1 - alpha, alphaev6, i386, i686, ia64
Red Hat Linux 7.2 - i386, i686, ia64
Red Hat Linux 7.3 - i386, i686

3. Problem description:

The GNU C library package, glibc, contains standard libraries which are
used by multiple programs on the system.

A read buffer overflow vulnerability exists in the glibc resolver code in
versions of glibc up to and including 2.2.5.  The vulnerability is
triggered by DNS packets larger than 1024 bytes and can cause applications
to crash.

All Red Hat Linux users are advised to upgrade to these errata packages
which contain a patch to correct this vulnerability.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory only contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. RPMs required:

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/glibc-2.1.3-27.src.rpm

alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/glibc-2.1.3-27.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/glibc-devel-2.1.3-27.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/glibc-profile-2.1.3-27.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/nscd-2.1.3-27.alpha.rpm

i386:
ftp://updates.redhat.com/6.2/en/os/i386/glibc-2.1.3-27.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/glibc-devel-2.1.3-27.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/glibc-profile-2.1.3-27.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/nscd-2.1.3-27.i386.rpm

sparc:
ftp://updates.redhat.com/6.2/en/os/sparc/glibc-2.1.3-27.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/glibc-devel-2.1.3-27.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/glibc-profile-2.1.3-27.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/nscd-2.1.3-27.sparc.rpm

sparcv9:
ftp://updates.redhat.com/6.2/en/os/sparcv9/glibc-2.1.3-27.sparcv9.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/glibc-2.2.4-18.7.0.7.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/glibc-2.2.4-18.7.0.7.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/glibc-common-2.2.4-18.7.0.7.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/glibc-devel-2.2.4-18.7.0.7.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/glibc-profile-2.2.4-18.7.0.7.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/nscd-2.2.4-18.7.0.7.alpha.rpm

alphaev6:
ftp://updates.redhat.com/7.0/en/os/alphaev6/glibc-2.2.4-18.7.0.7.alphaev6.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/glibc-2.2.4-18.7.0.7.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/glibc-common-2.2.4-18.7.0.7.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/glibc-devel-2.2.4-18.7.0.7.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/glibc-profile-2.2.4-18.7.0.7.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/nscd-2.2.4-18.7.0.7.i386.rpm

i686:
ftp://updates.redhat.com/7.0/en/os/i686/glibc-2.2.4-18.7.0.7.i686.rpm

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/glibc-2.2.4-30.src.rpm

alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/glibc-2.2.4-30.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/glibc-common-2.2.4-30.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/glibc-devel-2.2.4-30.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/glibc-profile-2.2.4-30.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/nscd-2.2.4-30.alpha.rpm

alphaev6:
ftp://updates.redhat.com/7.1/en/os/alphaev6/glibc-2.2.4-30.alphaev6.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/glibc-2.2.4-30.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/glibc-common-2.2.4-30.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/glibc-devel-2.2.4-30.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/glibc-profile-2.2.4-30.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/nscd-2.2.4-30.i386.rpm

i686:
ftp://updates.redhat.com/7.1/en/os/i686/glibc-2.2.4-30.i686.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/glibc-2.2.4-30.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/glibc-common-2.2.4-30.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/glibc-devel-2.2.4-30.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/glibc-profile-2.2.4-30.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/nscd-2.2.4-30.ia64.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/glibc-2.2.4-30.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/glibc-2.2.4-30.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/glibc-common-2.2.4-30.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/glibc-devel-2.2.4-30.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/glibc-profile-2.2.4-30.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/nscd-2.2.4-30.i386.rpm

i686:
ftp://updates.redhat.com/7.2/en/os/i686/glibc-2.2.4-30.i686.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/glibc-2.2.4-30.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/glibc-common-2.2.4-30.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/glibc-devel-2.2.4-30.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/glibc-profile-2.2.4-30.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/nscd-2.2.4-30.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/glibc-2.2.5-40.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/glibc-2.2.5-40.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-common-2.2.5-40.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-debug-2.2.5-40.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-debug-static-2.2.5-40.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-devel-2.2.5-40.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-profile-2.2.5-40.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-utils-2.2.5-40.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/nscd-2.2.5-40.i386.rpm

i686:
ftp://updates.redhat.com/7.3/en/os/i686/glibc-2.2.5-40.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/glibc-debug-2.2.5-40.i686.rpm



6. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
27f5218e46419359a40b4f922fac708f 6.2/en/os/SRPMS/glibc-2.1.3-27.src.rpm
91687dc0a92965c0952aff3a9f9ee04d 6.2/en/os/alpha/glibc-2.1.3-27.alpha.rpm
9ff78ba76d2203fa11db03f8c2b0b834 6.2/en/os/alpha/glibc-devel-2.1.3-27.alpha.rpm
88a35d7cbb2f6c81119a0acdafacd787 6.2/en/os/alpha/glibc-profile-2.1.3-27.alpha.rpm
daca37c0404f91da1fd6c038c70051db 6.2/en/os/alpha/nscd-2.1.3-27.alpha.rpm
664e9cff01f8c3b35bbe2cdbbde17b1e 6.2/en/os/i386/glibc-2.1.3-27.i386.rpm
4271716ebddc71acc37651a6f8906f69 6.2/en/os/i386/glibc-devel-2.1.3-27.i386.rpm
8fb1ef1d21cb2cf35c5b599401690773 6.2/en/os/i386/glibc-profile-2.1.3-27.i386.rpm
e1f6e18e3fa73093dfd8cc170e87d3b9 6.2/en/os/i386/nscd-2.1.3-27.i386.rpm
fc76db1231720f03734fe6256f6af762 6.2/en/os/sparc/glibc-2.1.3-27.sparc.rpm
6e7d0e16a09f05abdf62e1a1e005a313 6.2/en/os/sparc/glibc-devel-2.1.3-27.sparc.rpm
693e5955ca3073fea984c121690b1bd5 6.2/en/os/sparc/glibc-profile-2.1.3-27.sparc.rpm
f3615936ca1777f48a8283af9670de75 6.2/en/os/sparc/nscd-2.1.3-27.sparc.rpm
59292fccc060f69193158a82c30a61c9 6.2/en/os/sparcv9/glibc-2.1.3-27.sparcv9.rpm
2df1daf817b81557abf047ea1ec94d5f 7.0/en/os/SRPMS/glibc-2.2.4-18.7.0.7.src.rpm
cbb0d99fa81339366beb3fb32f83996b 7.0/en/os/alpha/glibc-2.2.4-18.7.0.7.alpha.rpm
48fc7f5a5d425b697435ac7674a4443d 7.0/en/os/alpha/glibc-common-2.2.4-18.7.0.7.alpha.rpm
2814f400723645d3a39aed11c2731a04 7.0/en/os/alpha/glibc-devel-2.2.4-18.7.0.7.alpha.rpm
59830dc03427ae5506b0eeb35efac7a9 7.0/en/os/alpha/glibc-profile-2.2.4-18.7.0.7.alpha.rpm
dec42bf0a0467193c9f4df6362a4ddec 7.0/en/os/alpha/nscd-2.2.4-18.7.0.7.alpha.rpm
bd2c88f67ef4e96ebaf3d04c7e888968 7.0/en/os/alphaev6/glibc-2.2.4-18.7.0.7.alphaev6.rpm
b3e8b7420767e681d5dd137eafa037df 7.0/en/os/i386/glibc-2.2.4-18.7.0.7.i386.rpm
6f5c2f785f0dd7fb02c2acb4f8ceac37 7.0/en/os/i386/glibc-common-2.2.4-18.7.0.7.i386.rpm
bb4efd84395ac61c45f371fd15747634 7.0/en/os/i386/glibc-devel-2.2.4-18.7.0.7.i386.rpm
5873afa8eaa92c50e9472f236e07a093 7.0/en/os/i386/glibc-profile-2.2.4-18.7.0.7.i386.rpm
bb3102105a2e9368477662e694e3adfc 7.0/en/os/i386/nscd-2.2.4-18.7.0.7.i386.rpm
20cc366797699622e15d9bd61927e821 7.0/en/os/i686/glibc-2.2.4-18.7.0.7.i686.rpm
4618ac0d57fceb8b0db2cbfee5a10446 7.1/en/os/SRPMS/glibc-2.2.4-30.src.rpm
66e66c3bd655be6562b44431d3ef3e5b 7.1/en/os/alpha/glibc-2.2.4-30.alpha.rpm
7da3af162c10ce2a23b3e68a20dec3d5 7.1/en/os/alpha/glibc-common-2.2.4-30.alpha.rpm
a4ed34c7b9e134485bb907fd5dfdba7d 7.1/en/os/alpha/glibc-devel-2.2.4-30.alpha.rpm
f7818486c7ffd4f1b1c9cb65a5eda5f3 7.1/en/os/alpha/glibc-profile-2.2.4-30.alpha.rpm
22f28435b66b584d17626685d44c413e 7.1/en/os/alpha/nscd-2.2.4-30.alpha.rpm
c1ceb01126a07fb23dfa41f8b6b2085a 7.1/en/os/alphaev6/glibc-2.2.4-30.alphaev6.rpm
e78b00060a514030fa7f571608e71950 7.1/en/os/i386/glibc-2.2.4-30.i386.rpm
dac9135a7e5da7a4d62483a7d4808193 7.1/en/os/i386/glibc-common-2.2.4-30.i386.rpm
c37924d44b0af8d7b218901dca3dee7a 7.1/en/os/i386/glibc-devel-2.2.4-30.i386.rpm
808a047f041b4d8809f454822bf7f799 7.1/en/os/i386/glibc-profile-2.2.4-30.i386.rpm
d3a0d948d9144e89662c242d6ccd1b39 7.1/en/os/i386/nscd-2.2.4-30.i386.rpm
fa3ae3e65cb7e6cf9b60b1af7c64f6f5 7.1/en/os/i686/glibc-2.2.4-30.i686.rpm
6873a0f780b150a8834e016e9e44d5b5 7.1/en/os/ia64/glibc-2.2.4-30.ia64.rpm
c9bc907d5ff684332b3b701ebb18a83b 7.1/en/os/ia64/glibc-common-2.2.4-30.ia64.rpm
04137ceb3d24bf6e37f7a04f5d2f7448 7.1/en/os/ia64/glibc-devel-2.2.4-30.ia64.rpm
425ae87389e089663d6e0009e292aed3 7.1/en/os/ia64/glibc-profile-2.2.4-30.ia64.rpm
15910bb8128e3a830606fb768b06374c 7.1/en/os/ia64/nscd-2.2.4-30.ia64.rpm
4618ac0d57fceb8b0db2cbfee5a10446 7.2/en/os/SRPMS/glibc-2.2.4-30.src.rpm
e78b00060a514030fa7f571608e71950 7.2/en/os/i386/glibc-2.2.4-30.i386.rpm
dac9135a7e5da7a4d62483a7d4808193 7.2/en/os/i386/glibc-common-2.2.4-30.i386.rpm
c37924d44b0af8d7b218901dca3dee7a 7.2/en/os/i386/glibc-devel-2.2.4-30.i386.rpm
808a047f041b4d8809f454822bf7f799 7.2/en/os/i386/glibc-profile-2.2.4-30.i386.rpm
d3a0d948d9144e89662c242d6ccd1b39 7.2/en/os/i386/nscd-2.2.4-30.i386.rpm
fa3ae3e65cb7e6cf9b60b1af7c64f6f5 7.2/en/os/i686/glibc-2.2.4-30.i686.rpm
6873a0f780b150a8834e016e9e44d5b5 7.2/en/os/ia64/glibc-2.2.4-30.ia64.rpm
c9bc907d5ff684332b3b701ebb18a83b 7.2/en/os/ia64/glibc-common-2.2.4-30.ia64.rpm
04137ceb3d24bf6e37f7a04f5d2f7448 7.2/en/os/ia64/glibc-devel-2.2.4-30.ia64.rpm
425ae87389e089663d6e0009e292aed3 7.2/en/os/ia64/glibc-profile-2.2.4-30.ia64.rpm
15910bb8128e3a830606fb768b06374c 7.2/en/os/ia64/nscd-2.2.4-30.ia64.rpm
44492986c37d0b0d7209f0d031524d69 7.3/en/os/SRPMS/glibc-2.2.5-40.src.rpm
a6f3971f1327a973011579961522d094 7.3/en/os/i386/glibc-2.2.5-40.i386.rpm
146296060bb7033e5657ee7d359da33a 7.3/en/os/i386/glibc-common-2.2.5-40.i386.rpm
9b6c54b07943ebe7879064752edbb6ec 7.3/en/os/i386/glibc-debug-2.2.5-40.i386.rpm
b965e578070ba9a6c9aa7b7cee5ff258 7.3/en/os/i386/glibc-debug-static-2.2.5-40.i386.rpm
c2dcbf9d83f6ae6e33e16c8f0ff02615 7.3/en/os/i386/glibc-devel-2.2.5-40.i386.rpm
4d87d114861530d2e8dd071baf181dac 7.3/en/os/i386/glibc-profile-2.2.5-40.i386.rpm
a94156cb193b4620be6847903840ec9d 7.3/en/os/i386/glibc-utils-2.2.5-40.i386.rpm
7959b6bd999b93e1eafb4f5a5fe3faaa 7.3/en/os/i386/nscd-2.2.5-40.i386.rpm
2ddc1effba611839002e2c899951eeb2 7.3/en/os/i686/glibc-2.2.5-40.i686.rpm
756e7e8b66e30331a879970665bf777d 7.3/en/os/i686/glibc-debug-2.2.5-40.i686.rpm


These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>


7. References:

http://www.kb.cert.org/vuls/id/738331
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1146



---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Updated nss_ldap packages fix buffer overflow
Advisory ID:       RHSA-2002:175-16
Issue date:        2002-08-12
Updated on:        2002-10-03
Product:           Red Hat Linux
Keywords:          nss_ldap dns automatic configuration MAXPACKET
Cross references:  
Obsoletes:         RHSA-2002:084
CVE Names:         CAN-2002-0825 CAN-2002-0374
---------------------------------------------------------------------

1. Topic:

Updated nss_ldap packages are now available for Red Hat Linux 6.2, 7, 7.1,
7.2, and 7.3. These updates fix a potential buffer overflow which can occur
when nss_ldap is set to configure itself using information stored in DNS,
a format string bug in logging functions used in pam_ldap, and to properly
handle truncated DNS responses.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - alpha, i386, sparc
Red Hat Linux 7.0 - alpha, i386
Red Hat Linux 7.1 - alpha, i386, ia64
Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386

3. Problem description:

nss_ldap is a set of C library extensions that allow X.500 and LDAP
directory servers to be used as a primary source of aliases, ethers,
groups, hosts, networks, protocols, users, RPCs, services, and shadow
passwords (instead of or in addition to using flat files or NIS).

When versions of nss_ldap prior to nss_ldap-198 are configured without a
value for the "host" setting, nss_ldap will attempt to configure itself by
using SRV records stored in DNS.  When parsing the results of the DNS
query, nss_ldap does not check that the data returned by the server will
fit into an internal buffer, leaving it vulnerable to a buffer overflow.
The Common Vulnerabilities and Exposures project (cve.mitre.org/) has
assigned the name CAN-2002-0825 to this issue.

When versions of nss_ldap prior to nss_ldap-199 are configured without a
value for the "host" setting, nss_ldap will attempt to configure itself by
using SRV records stored in DNS.  When parsing the results of the DNS
query, nss_ldap does not check that the data returned has not been
truncated by the resolver libraries to avoid a buffer overflow, and may
attempt to parse more data than is actually available, leaving it
vulnerable to a read buffer overflow.  

Versions of pam_ldap prior to version 144 include a format string bug in
the logging function. The packages included in this erratum update pam_ldap
to version 144, fixing this bug.  The Common Vulnerabilities and Exposures
project (cve.mitre.org/) has assigned the name CAN-2002-0374 to this issue.

All users of nss_ldap should update to these errata packages which are not
vulnerable to the above issues. The errata packages are based on
nss_ldap-189 with the addition of a backported security patch and pam_ldap
version 144.

Thanks to the nss_ldap and pam_ldap team at padl.com for providing
information about these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory only contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. RPMs required:

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/nss_ldap-189-3.6.src.rpm

alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/nss_ldap-189-3.6.alpha.rpm

i386:
ftp://updates.redhat.com/6.2/en/os/i386/nss_ldap-189-3.6.i386.rpm

sparc:
ftp://updates.redhat.com/6.2/en/os/sparc/nss_ldap-189-3.6.sparc.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/nss_ldap-189-3.7.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/nss_ldap-189-3.7.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/nss_ldap-189-3.7.i386.rpm

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/nss_ldap-189-3.7.src.rpm

alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/nss_ldap-189-3.7.alpha.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/nss_ldap-189-3.7.i386.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/nss_ldap-189-3.7.ia64.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/nss_ldap-189-4.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/nss_ldap-189-4.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/nss_ldap-189-4.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/nss_ldap-189-4.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/nss_ldap-189-4.i386.rpm



6. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
2acbcd575035a1afcb9e74694a6b7b39 6.2/en/os/SRPMS/nss_ldap-189-3.6.src.rpm
1a670c4c2a343b26508aa04ae06d2306 6.2/en/os/alpha/nss_ldap-189-3.6.alpha.rpm
4069002846304df7840cbe81517f8b3d 6.2/en/os/i386/nss_ldap-189-3.6.i386.rpm
e26b1be702d0bf65f455e17d16844354 6.2/en/os/sparc/nss_ldap-189-3.6.sparc.rpm
9b44c5148cd1d3d688a9603f11a4d794 7.0/en/os/SRPMS/nss_ldap-189-3.7.src.rpm
2d245d41c6a27b62670a0e3cbc48e93b 7.0/en/os/alpha/nss_ldap-189-3.7.alpha.rpm
5c34d52cfa0425e8b3d0e63838729703 7.0/en/os/i386/nss_ldap-189-3.7.i386.rpm
9b44c5148cd1d3d688a9603f11a4d794 7.1/en/os/SRPMS/nss_ldap-189-3.7.src.rpm
2d245d41c6a27b62670a0e3cbc48e93b 7.1/en/os/alpha/nss_ldap-189-3.7.alpha.rpm
5c34d52cfa0425e8b3d0e63838729703 7.1/en/os/i386/nss_ldap-189-3.7.i386.rpm
27c07eb113adebc7d79d48d8c9df9356 7.1/en/os/ia64/nss_ldap-189-3.7.ia64.rpm
d421772f8f5bd985dc2c288aee729ff6 7.2/en/os/SRPMS/nss_ldap-189-4.src.rpm
8dc0d40503cbc09a55a111fc53ec42ba 7.2/en/os/i386/nss_ldap-189-4.i386.rpm
acd545a47e2be38ed8c9b94ea9801e4c 7.2/en/os/ia64/nss_ldap-189-4.ia64.rpm
d421772f8f5bd985dc2c288aee729ff6 7.3/en/os/SRPMS/nss_ldap-189-4.src.rpm
8dc0d40503cbc09a55a111fc53ec42ba 7.3/en/os/i386/nss_ldap-189-4.i386.rpm


These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>


7. References:

http://www.padl.com/Articles/PotentialBufferOverflowin.html
http://www.padl.com/OSS/pam_ldap.html
http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0053.html
http://www.kb.cert.org/vuls/id/738331
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0374



---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Updated tcpdump packages fix buffer overflow
Advisory ID:       RHSA-2002:094-16
Issue date:        2002-05-17
Updated on:        2002-10-04
Product:           Red Hat Linux
Keywords:          tcpdump arpwatch buffer overflow
Cross references:  
Obsoletes:         RHSA-2001:089-10
CVE Names:         CAN-2002-0380
---------------------------------------------------------------------

1. Topic:

Updated tcpdump, libpcap, and arpwatch packages are available for Red
Hat Linux 6.2 and 7.x. These updates close a buffer overflow when handling
NFS packets.

[Update 3 October 2002]
Replacement packages have been added for Red Hat Linux 6.2 as the previous
packages could not be installed with the version of RPM that shipped with
Red Hat Linux 6.2.  Replacement packages have also been added for Red Hat
Linux 7.0 as the previous packages were not built correctly.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - alpha, i386, sparc
Red Hat Linux 7.0 - alpha, i386
Red Hat Linux 7.1 - alpha, i386, ia64
Red Hat Linux 7.2 - i386, ia64

3. Problem description:

tcpdump is a command-line tool for monitoring network traffic.  Versions of
tcpdump up to and including 3.6.2 have a buffer overflow that can be
triggered when tracing the network by a bad NFS packet.

We are not yet aware if this issue is fully exploitable; however, users of
tcpdump are advised to upgrade to these errata packages which contain a
patch for this issue.

The Common Vulnerabilities and Exposures project (cve.mitre.org/) has
assigned the name CAN-2002-0380 to this issue.  This issue was found by
David Woodhouse of Red Hat.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory only contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

55145 - tcpdump segfaults when displaying NFS traffic.
63113 - Start script refers to non/existing /etc/init.d directory

6. RPMs required:

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/tcpdump-3.6.2-11.6.2.2.src.rpm

alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/tcpdump-3.6.2-11.6.2.2.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/libpcap-0.6.2-11.6.2.2.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/arpwatch-2.1a11-11.6.2.2.alpha.rpm

i386:
ftp://updates.redhat.com/6.2/en/os/i386/tcpdump-3.6.2-11.6.2.2.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/libpcap-0.6.2-11.6.2.2.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/arpwatch-2.1a11-11.6.2.2.i386.rpm

sparc:
ftp://updates.redhat.com/6.2/en/os/sparc/tcpdump-3.6.2-11.6.2.2.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/libpcap-0.6.2-11.6.2.2.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/arpwatch-2.1a11-11.6.2.2.sparc.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/tcpdump-3.6.2-11.7.0.1.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/tcpdump-3.6.2-11.7.0.1.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/libpcap-0.6.2-11.7.0.1.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/arpwatch-2.1a11-11.7.0.1.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/tcpdump-3.6.2-11.7.0.1.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/libpcap-0.6.2-11.7.0.1.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/arpwatch-2.1a11-11.7.0.1.i386.rpm

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/tcpdump-3.6.2-11.7.1.0.src.rpm

alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/tcpdump-3.6.2-11.7.1.0.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/libpcap-0.6.2-11.7.1.0.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/arpwatch-2.1a11-11.7.1.0.alpha.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/tcpdump-3.6.2-11.7.1.0.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/libpcap-0.6.2-11.7.1.0.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/arpwatch-2.1a11-11.7.1.0.i386.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/tcpdump-3.6.2-11.7.1.0.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/libpcap-0.6.2-11.7.1.0.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/arpwatch-2.1a11-11.7.1.0.ia64.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/tcpdump-3.6.2-11.7.2.0.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/tcpdump-3.6.2-11.7.2.0.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/libpcap-0.6.2-11.7.2.0.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/arpwatch-2.1a11-11.7.2.0.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/tcpdump-3.6.2-11.7.2.0.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/libpcap-0.6.2-11.7.2.0.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/arpwatch-2.1a11-11.7.2.0.ia64.rpm



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
0d1978ac6fbf008d559ba4c6732f21e7 6.2/en/os/SRPMS/tcpdump-3.6.2-11.6.2.2.src.rpm
db348001b61114bdc5dbfb8aacec9c4b 6.2/en/os/alpha/arpwatch-2.1a11-11.6.2.2.alpha.rpm
6db33d48ac163d3bc0aeb5c1c215f549 6.2/en/os/alpha/libpcap-0.6.2-11.6.2.2.alpha.rpm
4b2a073b84675781df605ada020926d7 6.2/en/os/alpha/tcpdump-3.6.2-11.6.2.2.alpha.rpm
c82c835a28a5cd191cbc660cb63a0325 6.2/en/os/i386/arpwatch-2.1a11-11.6.2.2.i386.rpm
50819dab95623b007dcb1364be15697e 6.2/en/os/i386/libpcap-0.6.2-11.6.2.2.i386.rpm
47038e2ab0d9d978592605601b51d8d4 6.2/en/os/i386/tcpdump-3.6.2-11.6.2.2.i386.rpm
918d817dfecbfa52f485a634f6eff5d1 6.2/en/os/sparc/arpwatch-2.1a11-11.6.2.2.sparc.rpm
b7e2e105bc460df515a29b9a2540622a 6.2/en/os/sparc/libpcap-0.6.2-11.6.2.2.sparc.rpm
0dbbc51da0998ccebf2a7a790f5f77af 6.2/en/os/sparc/tcpdump-3.6.2-11.6.2.2.sparc.rpm
520dd6721b416315adfa815ccbf1c9e1 7.0/en/os/SRPMS/tcpdump-3.6.2-11.7.0.1.src.rpm
b1b439b8b84cbd8f1288c964547571e0 7.0/en/os/alpha/arpwatch-2.1a11-11.7.0.1.alpha.rpm
a45bd661561b2307c2853430f3183367 7.0/en/os/alpha/libpcap-0.6.2-11.7.0.1.alpha.rpm
9970d0be7edeb613cf7087d5acdf48d4 7.0/en/os/alpha/tcpdump-3.6.2-11.7.0.1.alpha.rpm
d677bbce990410dc9b203be3fc005c79 7.0/en/os/i386/arpwatch-2.1a11-11.7.0.1.i386.rpm
dbab830179454642ee4e6070379467ac 7.0/en/os/i386/libpcap-0.6.2-11.7.0.1.i386.rpm
7025f66b80b8c164a2db05c364c1c805 7.0/en/os/i386/tcpdump-3.6.2-11.7.0.1.i386.rpm
27bf8dea340db81f1e946356c6bef684 7.1/en/os/SRPMS/tcpdump-3.6.2-11.7.1.0.src.rpm
a677cec9114214c2ea5e5b17e709883d 7.1/en/os/alpha/arpwatch-2.1a11-11.7.1.0.alpha.rpm
f7b8cf962abe27d65d628dae5cb992bd 7.1/en/os/alpha/libpcap-0.6.2-11.7.1.0.alpha.rpm
755e2fa9fb0530735e03388f702cfd38 7.1/en/os/alpha/tcpdump-3.6.2-11.7.1.0.alpha.rpm
edc6718ed479661f40c929da92b4e24b 7.1/en/os/i386/arpwatch-2.1a11-11.7.1.0.i386.rpm
4e1a186b4287de4183a7fca4d868906e 7.1/en/os/i386/libpcap-0.6.2-11.7.1.0.i386.rpm
2eb63c329def52d1bcdd88f8b3d01841 7.1/en/os/i386/tcpdump-3.6.2-11.7.1.0.i386.rpm
17319e98b00c707f8c924766f0395aad 7.1/en/os/ia64/arpwatch-2.1a11-11.7.1.0.ia64.rpm
8a214b04f325451eecaf08574ebacc7a 7.1/en/os/ia64/libpcap-0.6.2-11.7.1.0.ia64.rpm
90db41ce76a94d2d10369437704bb934 7.1/en/os/ia64/tcpdump-3.6.2-11.7.1.0.ia64.rpm
1cfcf4efdad9c8d44f9c70a9da8da690 7.2/en/os/SRPMS/tcpdump-3.6.2-11.7.2.0.src.rpm
82f93afd069a3b85ddf5a44daeff589f 7.2/en/os/i386/arpwatch-2.1a11-11.7.2.0.i386.rpm
f26ebb5d1cbb91d4b5effd9174f1728d 7.2/en/os/i386/libpcap-0.6.2-11.7.2.0.i386.rpm
cc168b456fbde106ad1879fe7346c1ee 7.2/en/os/i386/tcpdump-3.6.2-11.7.2.0.i386.rpm
74863a3b3110d2dbb03a03c1ad213152 7.2/en/os/ia64/arpwatch-2.1a11-11.7.2.0.ia64.rpm
876adc0c4d794e75a48e5c6b87fbca45 7.2/en/os/ia64/libpcap-0.6.2-11.7.2.0.ia64.rpm
f7543f13b1734c779cafd600566569b2 7.2/en/os/ia64/tcpdump-3.6.2-11.7.2.0.ia64.rpm


These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>


8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0380


Copyright(c) 2000, 2001, 2002 Red Hat, Inc.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis