|
[ Message Precedent sur la mailing][ Message Suivant sur la mailing][ Precedent dans le fil][ Prochain dans le fil][ Index par Date][ Index par fil]
[SA32051] Ubuntu update for cpio
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details:
link://[click]
TITLE:
Ubuntu update for cpio
SECUNIA ADVISORY ID:
SA32051
VERIFY ADVISORY:
link://[click]
CRITICAL:
Not critical
IMPACT:
DoS
WHERE:
From remote
OPERATING SYSTEM:
Ubuntu Linux 6.06
link://[click]
Ubuntu Linux 7.04
link://[click]
Ubuntu Linux 7.10
link://[click]
DESCRIPTION:
Ubuntu has issued an update for cpio. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
The vulnerability is caused due to an error when processing specially
crafted tar archives and can be exploited to cause a stack-based
buffer overflow and crash the vulnerable application.
SOLUTION:
Apply updated packages.
-- Ubuntu 6.06 LTS --
Source archives:
link://[click]
Size/MD5: 410699 897e47a353787824a28bda1097991559
link://[click]
Size/MD5: 550 d2aa24f48103c70f12be33f7294baf8d
link://[click]
Size/MD5: 556018 76b4145f33df088a5bade3bf4373d17d
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
link://[click]
Size/MD5: 103172 28261384f4dbb4201ae3ecad7361f280
i386 architecture (x86 compatible Intel/AMD):
link://[click]
Size/MD5: 94196 b78101aaac890a244a835b45c400a91d
powerpc architecture (Apple Macintosh G3/G4/G5):
link://[click]
Size/MD5: 103196 b40a0b8c7c866bd4d2cf7519b12d716a
sparc architecture (Sun SPARC/UltraSPARC):
link://[click]
Size/MD5: 96740 2462b4543ccd3b03b6846246cc97ff2a
-- Ubuntu 7.04 --
Source archives:
link://[click]
Size/MD5: 460609 a3bcce318e104b941b22cbc0f71c5174
link://[click]
Size/MD5: 569 525b21bd40294fbe826b49fe028708c9
link://[click]
Size/MD5: 556018 76b4145f33df088a5bade3bf4373d17d
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
link://[click]
Size/MD5: 103010 8e9ec28331d06646b742cfc17ae9114e
i386 architecture (x86 compatible Intel/AMD):
link://[click]
Size/MD5: 97468 73731d39ac27aef0aa877988aaa1b931
powerpc architecture (Apple Macintosh G3/G4/G5):
link://[click]
Size/MD5: 106366 f7fd3f9680e69708c522628e55b187ab
sparc architecture (Sun SPARC/UltraSPARC):
link://[click]
Size/MD5: 98544 162d787d7f348112fb0fb37c75dc428d
-- Ubuntu 7.10 --
Source archives:
link://[click]
Size/MD5: 9309 2e49f657e658d3625da48fb7a871b1a1
link://[click]
Size/MD5: 756 565858b26f82dc113973769944ad1690
link://[click]
Size/MD5: 968134 0caa356e69e149fb49b76bacc64615a1
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
link://[click]
Size/MD5: 116028 1a22d0616279aa82e6f4e257bd3df974
i386 architecture (x86 compatible Intel/AMD):
link://[click]
Size/MD5: 107668 e4ef21359c746b204c3727deee719e38
lpia architecture (Low Power Intel Architecture):
link://[click]
Size/MD5: 107782 5b9aa00bbea6ddf6518feb6818b733aa
powerpc architecture (Apple Macintosh G3/G4/G5):
link://[click]
Size/MD5: 119036 98b1fe38188f5455e1bf954ab7885fc2
sparc architecture (Sun SPARC/UltraSPARC):
link://[click]
Size/MD5: 109594 0054e1d76985bc0291ced0ecc1537fc0
ORIGINAL ADVISORY:
USN-650-1:
link://[click]
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
link://[click]
Definitions: (Criticality, Where etc.)
link://[click]
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|