From security@linux-mandrake.com Wed Nov 10 21:58:44 2004 From: Mandrake Linux Security Team To: full-disclosure@lists.netsys.com Date: 11 Nov 2004 00:03:12 -0000 Subject: [Full-Disclosure] MDKSA-2004:130 - Updated speedtouch packages fix format string vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandrakelinux Security Update Advisory _______________________________________________________________________ Package name: speedtouch Advisory ID: MDKSA-2004:130 Date: November 10th, 2004 Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1, Multi Network Firewall 8.2 ______________________________________________________________________ Problem Description: The Speedtouch USB driver contains a number of format string vulnerabilities due to improperly made syslog() system calls. These vulnerabilities can be abused by a local user to potentially allow the execution of arbitray code with elevated privileges. The updated packages have been patched to prevent this problem. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0834 ______________________________________________________________________ Updated Packages: Mandrakelinux 10.0: 36c7a9bab1146e2be2e45bc4f39dbe5c 10.0/RPMS/speedtouch-1.2-2.beta3.2.1.100mdk.i586.rpm bd8d73c3c366a457b1134e1c80261426 10.0/SRPMS/speedtouch-1.2-2.beta3.2.1.100mdk.src.rpm Mandrakelinux 10.0/AMD64: a9376a00cd508d5b2d87d56dea2189fb amd64/10.0/RPMS/speedtouch-1.2-2.beta3.2.1.100mdk.amd64.rpm bd8d73c3c366a457b1134e1c80261426 amd64/10.0/SRPMS/speedtouch-1.2-2.beta3.2.1.100mdk.src.rpm Mandrakelinux 10.1: 4d25215c40bd029c4531d21a8f078d54 10.1/RPMS/speedtouch-1.3-8.1.101mdk.i586.rpm 524b17d3a8be931a880bb59429de9e7d 10.1/SRPMS/speedtouch-1.3-8.1.101mdk.src.rpm Mandrakelinux 10.1/X86_64: 730553feef648f9fd12c0102c84c18ce x86_64/10.1/RPMS/speedtouch-1.3-8.1.101mdk.x86_64.rpm 524b17d3a8be931a880bb59429de9e7d x86_64/10.1/SRPMS/speedtouch-1.3-8.1.101mdk.src.rpm Corporate Server 2.1: 5bb758310e7255364bed57516e7bc0b7 corporate/2.1/RPMS/speedtouch-1.0-3.1.C21mdk.i586.rpm a2418dfb4c05ee8e4b035e875fa5eaf9 corporate/2.1/SRPMS/speedtouch-1.0-3.1.C21mdk.src.rpm Corporate Server 2.1/x86_64: aec85babd39953ecb4f826eff31a957e x86_64/corporate/2.1/RPMS/speedtouch-1.0-3.1.C21mdk.x86_64.rpm a2418dfb4c05ee8e4b035e875fa5eaf9 x86_64/corporate/2.1/SRPMS/speedtouch-1.0-3.1.C21mdk.src.rpm Mandrakelinux 9.2: 65668234b2a7ff0208777c5fbdd825bd 9.2/RPMS/speedtouch-1.2-1.1.92mdk.i586.rpm 8defb80e8ba01a169aba1b5f43cf964b 9.2/SRPMS/speedtouch-1.2-1.1.92mdk.src.rpm Mandrakelinux 9.2/AMD64: ae6362903a2de1035c1aea6a42e7083b amd64/9.2/RPMS/speedtouch-1.2-1.1.92mdk.amd64.rpm 8defb80e8ba01a169aba1b5f43cf964b amd64/9.2/SRPMS/speedtouch-1.2-1.1.92mdk.src.rpm Multi Network Firewall 8.2: 15a296448e3d9124d542e289fc87e7fc mnf8.2/RPMS/speedtouch-1.0-3.1.M82mdk.i586.rpm 9fef8e30a43efcee2fc3a1167df69ac5 mnf8.2/SRPMS/speedtouch-1.0-3.1.M82mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandrakelinux at: http://www.mandrakesoft.com/security/advisories If you want to report vulnerabilities, please contact security_linux-mandrake.com Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFBkqxAmqjQ0CJFipgRAlr4AJ0RjMZ5kQ6mdjbGTkgkQ1SuOQmSEgCg46QF ocNopcuk8K3hi2BAqAhxr8I= =F14v -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html