From martin.pitt@canonical.com Thu Mar 17 15:37:31 2005 From: Martin Pitt To: ubuntu-security-announce@lists.ubuntu.com Cc: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com Date: Thu, 17 Mar 2005 18:47:04 +0100 Subject: [USN-98-1] OpenSLP vulnerabilities =========================================================== Ubuntu Security Notice USN-98-1 March 17, 2005 openslp vulnerabilities http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032534.html =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) The following packages are affected: libslp1 slpd The problem can be corrected by upgrading the affected package to version 1.0.11-7ubuntu0.1. In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: The SuSE Security Team discovered several buffer overflows in the OpenSLP server and client library. By sending specially crafted SLP packets, a remote attacker could exploit this to crash the SLP server or execute arbitrary code with the privileges of the "daemon" user. Likewise, a malicious SLP server could exploit the client library vulnerabilities to execute arbitrary code with the privileges of the user running the SLP client application. Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openslp/openslp_1.0.11-7ubuntu0.1.diff.gz Size/MD5: 151039 eb727a65716e86e757e34748aa24cc45 http://security.ubuntu.com/ubuntu/pool/main/o/openslp/openslp_1.0.11-7ubuntu0.1.dsc Size/MD5: 655 5ff8151d34a2b861a3d9f614072b92ca http://security.ubuntu.com/ubuntu/pool/main/o/openslp/openslp_1.0.11.orig.tar.gz Size/MD5: 608138 0ec965956ad1f66850f050b19c828b55 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/o/openslp/openslp-doc_1.0.11-7ubuntu0.1_all.deb Size/MD5: 95946 dffab2db867d3604939d692ffb3904f7 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp-dev_1.0.11-7ubuntu0.1_amd64.deb Size/MD5: 65082 9a8acfb6e05f13688bb9d54c85c3593b http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp1_1.0.11-7ubuntu0.1_amd64.deb Size/MD5: 47610 a536d6a50a6d64453606178ec4f17ef1 http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slpd_1.0.11-7ubuntu0.1_amd64.deb Size/MD5: 70866 7f52d0fd37f71aec8e1940e1e34a9b63 http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slptool_1.0.11-7ubuntu0.1_amd64.deb Size/MD5: 26546 44d2d312536407a1c2af16b265d04035 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp-dev_1.0.11-7ubuntu0.1_i386.deb Size/MD5: 62000 fd04134fb0f1f98c2662d35ff340041d http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp1_1.0.11-7ubuntu0.1_i386.deb Size/MD5: 45890 d703c3f516e7e67d918579f20c8c45aa http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slpd_1.0.11-7ubuntu0.1_i386.deb Size/MD5: 65100 ec67710b0585c62c7142f036256c9853 http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slptool_1.0.11-7ubuntu0.1_i386.deb Size/MD5: 26086 d83af46fc9e6e9981a6e5c5a1d23fdad powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp-dev_1.0.11-7ubuntu0.1_powerpc.deb Size/MD5: 66202 ad95b923ad7b89cadb37972ccbe10443 http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp1_1.0.11-7ubuntu0.1_powerpc.deb Size/MD5: 48928 ca8dfeddadab73241b9a3f36c6989e0d http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slpd_1.0.11-7ubuntu0.1_powerpc.deb Size/MD5: 72190 08e568c75979eaa01619668b6b68d06b http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slptool_1.0.11-7ubuntu0.1_powerpc.deb Size/MD5: 28076 f507323a5ffa3082f34f610f911fd05a [ Part 2, "Digital signature" Application/PGP-SIGNATURE ] [ 196bytes. ] [ Unable to print this part. ]