Date: 12 April 2001
References: ESB-2001.138 ESB-2001.139 ESB-2001.140 ESB-2001.141 ESB-2001.149
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2001.148 -- Debian Security Advisory DSA-045-2
New version of ntp released
12 April 2001
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: ntp
Vendor: Debian
Operating System: Debian GNU/Linux 2.2 (potato)
Platform: Alpha
arm
i386
m68k
powerpc
Sparc
Impact: Denial of Service
Access Required: Remote
Ref: ESB-2001.138
ESB-2001.139
ESB-2001.140
ESB-2001.141
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
- - ----------------------------------------------------------------------------
Debian Security Advisory DSA-045-2 security@debian.org
http://www.debian.org/security/ Michael Stone
April 9, 2001
- - ----------------------------------------------------------------------------
Package: ntp
Vulnerability: remote root exploit
Debian-specific: no
Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL> reported that ntp
daemons such as that released with Debian GNU/Linux are vulnerable to a
buffer overflow that can lead to a remote root exploit. A previous
advisory (DSA-045-1) partially addressed this issue, but introduced a
potential denial of service attack. This has been corrected for Debian
2.2 (potato) in ntp version 4.0.99g-2potato2.
We recommend you upgrade your ntp package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
- - ------------------------------------
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
architectures.
Source archives:
http://security.debian.org/debian-security/dists/stable/updates/main/source/ntp_4.0.99g-2potato2.diff.gz
MD5 checksum: 33eced8dfeecefed9ecd7a5425dce07f
http://security.debian.org/debian-security/dists/stable/updates/main/source/ntp_4.0.99g-2potato2.dsc
MD5 checksum: b704b4528c96b6b22ff2809cd551c221
http://security.debian.org/debian-security/dists/stable/updates/main/source/ntp_4.0.99g.orig.tar.gz
MD5 checksum: 6f3132fb4f6a3ee411554d09270f562a
Architecture-independent files:
http://security.debian.org/debian-security/dists/stable/updates/main/binary-all/ntp-doc_4.0.99g-2potato2_all.deb
MD5 checksum: cfa7f1a427fb65dc85eca68f823c95d7
http://security.debian.org/debian-security/dists/stable/updates/main/binary-all/xntp3_4.0.99g-2potato2_all.deb
MD5 checksum: 3216aeca42720cd2b00f19ef05dc4ff8
Alpha architecture:
http://security.debian.org/debian-security/dists/stable/updates/main/binary-alpha/ntp_4.0.99g-2potato2_alpha.deb
MD5 checksum: 09b2b4720a150be0421d3126de807b21
http://security.debian.org/debian-security/dists/stable/updates/main/binary-alpha/ntpdate_4.0.99g-2potato2_alpha.deb
MD5 checksum: 31d07aa810aa1b6b3a146e75ddb1fc6a
ARM architecture:
http://security.debian.org/debian-security/dists/stable/updates/main/binary-arm/ntp_4.0.99g-2potato2_arm.deb
MD5 checksum: a099db2427b225e880da87c560bfb5b3
http://security.debian.org/debian-security/dists/stable/updates/main/binary-arm/ntpdate_4.0.99g-2potato2_arm.deb
MD5 checksum: fb8f5f35fc3b9f3db0d17c7fb302c6dd
Intel ia32 architecture:
http://security.debian.org/debian-security/dists/stable/updates/main/binary-i386/ntp_4.0.99g-2potato2_i386.deb
MD5 checksum: 2a01903f179ccc41a87a8c9495f06747
http://security.debian.org/debian-security/dists/stable/updates/main/binary-i386/ntpdate_4.0.99g-2potato2_i386.deb
MD5 checksum: 915a79c8724151e0adf430ca57ad9844
Motorola 680x0 architecture:
http://security.debian.org/debian-security/dists/stable/updates/main/binary-m68k/ntp_4.0.99g-2potato2_m68k.deb
MD5 checksum: dc3826e35dafd4163062f149a63f2bbe
http://security.debian.org/debian-security/dists/stable/updates/main/binary-m68k/ntpdate_4.0.99g-2potato2_m68k.deb
MD5 checksum: 6666baa200509e76e0c32dd0166bcb79
PowerPC architecture:
http://security.debian.org/debian-security/dists/stable/updates/main/binary-powerpc/ntp_4.0.99g-2potato2_powerpc.deb
MD5 checksum: 8387ad0831907e26566b2d329425d0e1
http://security.debian.org/debian-security/dists/stable/updates/main/binary-powerpc/ntpdate_4.0.99g-2potato2_powerpc.deb
MD5 checksum: 5d90bf20314abc66efe7fea2ecb521d7
Sun Sparc architecture:
http://security.debian.org/debian-security/dists/stable/updates/main/binary-sparc/ntp_4.0.99g-2potato2_sparc.deb
MD5 checksum: b014f4a20d4a0c2ec5e788fafc7dd3cd
http://security.debian.org/debian-security/dists/stable/updates/main/binary-sparc/ntpdate_4.0.99g-2potato2_sparc.deb
MD5 checksum: abe31f82a9b202b8880b51b97327cc3b
These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
- - ----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iQCVAwUBOtGkMQ0hVr09l8FJAQEpbwP/UhpylQWshhXzWajpPdfuHKBkPBlgEpXw
15fm9McTPf7PZUUBmwXxoi+cz486biVZXPdichsWbi7pr4w7shmUiH2R9FZ5x5sT
puBy6aG0bHRnS2csROanQObwPf/MX34tFntMD/vJgLJNVDQQ328PBb+VmxkJnrU2
oErPUltAJbM=
=TYE3
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/Information/advisories.html
If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for emergencies.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key
iQCVAwUBOtV8Byh9+71yA2DNAQFOQAP/c+iSJBJWoWnU+KAYYtWyQnboshwWrye/
EWAv6RJrMAQXmygnKn4JXDfeflaFcpR6sQWa8MPhMZOHs1QgRH1KfnBx1aHBe60C
s9qtlwykg8PhMHsja/rPeVFxwLKAQJgVE0Rvdm/QXfv8F7ctb0wPoYT+qmJ74Z91
pM2aDzHvAQA=
=Nevw
-----END PGP SIGNATURE-----
|