[Full-Disclosure] MDKSA-2005:005 - Updated nfs-utils packages fix 64bit vulnerability

From: Mandrake Linux Security Team (security_at_linux-mandrake.com)
Date: 01/12/05

  • Next message: Darren Bounds: "Re: [Full-Disclosure] Multi-vendor AV gateway image inspection bypass vulnerability"
    To: full-disclosure@lists.netsys.com
    Date: Tue, 11 Jan 2005 16:11:26 -0700
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

     _______________________________________________________________________

                     Mandrakelinux Security Update Advisory
     _______________________________________________________________________

     Package name: nfs-utils
     Advisory ID: MDKSA-2005:005
     Date: January 11th, 2005

     Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1
     ______________________________________________________________________

     Problem Description:

     Arjan van de Ven discovered a buffer overflow in rquotad on 64bit
     architectures; an improper integer conversion could lead to a
     buffer overflow. An attacker with access to an NFS share could send a
     specially crafted request which could then lead to the execution of
     arbitrary code.
     
     The updated packages are provided to prevent this issue.
     _______________________________________________________________________

     References:

      http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0946
     ______________________________________________________________________

     Updated Packages:
      
     Mandrakelinux 10.0:
     71991bf34674e4bebd4870c24dce4929 10.0/RPMS/nfs-utils-1.0.6-2.2.100mdk.i586.rpm
     1c6231362def3c56d747b3ccc22b7597 10.0/RPMS/nfs-utils-clients-1.0.6-2.2.100mdk.i586.rpm
     bf52589c8d97f63f3024f90a79c201c9 10.0/SRPMS/nfs-utils-1.0.6-2.2.100mdk.src.rpm

     Mandrakelinux 10.0/AMD64:
     28bc6309e5488cd7bf294ae1a4ce68b2 amd64/10.0/RPMS/nfs-utils-1.0.6-2.2.100mdk.amd64.rpm
     ed8b7dfa77200e5badb473678a91bb2a amd64/10.0/RPMS/nfs-utils-clients-1.0.6-2.2.100mdk.amd64.rpm
     bf52589c8d97f63f3024f90a79c201c9 amd64/10.0/SRPMS/nfs-utils-1.0.6-2.2.100mdk.src.rpm

     Mandrakelinux 10.1:
     bb7161793b2154c3e122adabaed9ed60 10.1/RPMS/nfs-utils-1.0.6-2.2.101mdk.i586.rpm
     e219e85405758a9ef9511eacf4118e07 10.1/RPMS/nfs-utils-clients-1.0.6-2.2.101mdk.i586.rpm
     7510d378225740169ae1a3dbaf0f223f 10.1/SRPMS/nfs-utils-1.0.6-2.2.101mdk.src.rpm

     Mandrakelinux 10.1/X86_64:
     ed70043e2d95cbebc2cd12e0f973a29f x86_64/10.1/RPMS/nfs-utils-1.0.6-2.2.101mdk.x86_64.rpm
     7c086dfb028423e9105525111194aff5 x86_64/10.1/RPMS/nfs-utils-clients-1.0.6-2.2.101mdk.x86_64.rpm
     7510d378225740169ae1a3dbaf0f223f x86_64/10.1/SRPMS/nfs-utils-1.0.6-2.2.101mdk.src.rpm

     Corporate Server 2.1:
     cc1b1f4c8232db49f40df9117d2237f8 corporate/2.1/RPMS/nfs-utils-1.0.1-1.3.C21mdk.i586.rpm
     8af58044e57d46921c0ad8745826d1dd corporate/2.1/RPMS/nfs-utils-clients-1.0.1-1.3.C21mdk.i586.rpm
     9d167452a31fc1e5ef4f43086f0d7b34 corporate/2.1/SRPMS/nfs-utils-1.0.1-1.3.C21mdk.src.rpm

     Corporate Server 2.1/x86_64:
     c7f8d994d4d261d41f6bf246c280fb10 x86_64/corporate/2.1/RPMS/nfs-utils-1.0.1-1.3.C21mdk.x86_64.rpm
     77be17723eb840715500edb3cf8c687b x86_64/corporate/2.1/RPMS/nfs-utils-clients-1.0.1-1.3.C21mdk.x86_64.rpm
     9d167452a31fc1e5ef4f43086f0d7b34 x86_64/corporate/2.1/SRPMS/nfs-utils-1.0.1-1.3.C21mdk.src.rpm

     Mandrakelinux 9.2:
     00f2319415647d9fa85926cc05271793 9.2/RPMS/nfs-utils-1.0.5-1.2.92mdk.i586.rpm
     680ef7be663350d18ad5b7f94bbc2e21 9.2/RPMS/nfs-utils-clients-1.0.5-1.2.92mdk.i586.rpm
     4a49c7508d166c62b6d76e7c1cccbacd 9.2/SRPMS/nfs-utils-1.0.5-1.2.92mdk.src.rpm

     Mandrakelinux 9.2/AMD64:
     c0e275ce5838575eda14efb2d582aefc amd64/9.2/RPMS/nfs-utils-1.0.5-1.2.92mdk.amd64.rpm
     779856f22f146342ab6e42c4f20acd95 amd64/9.2/RPMS/nfs-utils-clients-1.0.5-1.2.92mdk.amd64.rpm
     4a49c7508d166c62b6d76e7c1cccbacd amd64/9.2/SRPMS/nfs-utils-1.0.5-1.2.92mdk.src.rpm
     _______________________________________________________________________

     To upgrade automatically use MandrakeUpdate or urpmi. The verification
     of md5 checksums and GPG signatures is performed automatically for you.

     All packages are signed by Mandrakesoft for security. You can obtain
     the GPG public key of the Mandrakelinux Security Team by executing:

      gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

     You can view other update advisories for Mandrakelinux at:

      http://www.mandrakesoft.com/security/advisories

     If you want to report vulnerabilities, please contact

      security_linux-mandrake.com

     Type Bits/KeyID Date User ID
     pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
      <security linux-mandrake.com>
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.4 (GNU/Linux)

    iD8DBQFB5F0emqjQ0CJFipgRAg3wAKDBYs/rXJUwddiDT27a+ij2yMOS7QCfY11g
    cDdxBS2vNnkYW79o+n63YRk=
    =ggoY
    -----END PGP SIGNATURE-----
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html


  • Next message: Darren Bounds: "Re: [Full-Disclosure] Multi-vendor AV gateway image inspection bypass vulnerability"