copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2001.148 -- Debian Security Advisory DSA-045-2 -- New version of ntp released

Date: 12 April 2001
References: ESB-2001.138  ESB-2001.139  ESB-2001.140  ESB-2001.141  ESB-2001.149  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2001.148 -- Debian Security Advisory DSA-045-2
                        New version of ntp released
                               12 April 2001

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                ntp
Vendor:                 Debian
Operating System:       Debian GNU/Linux 2.2 (potato)
Platform:               Alpha
                        arm
                        i386
                        m68k
                        powerpc
                        Sparc
Impact:                 Denial of Service
Access Required:        Remote

Ref:                    ESB-2001.138
                        ESB-2001.139
                        ESB-2001.140
                        ESB-2001.141

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----

- - ----------------------------------------------------------------------------
Debian Security Advisory DSA-045-2                       security@debian.org
http://www.debian.org/security/                                Michael Stone
April 9, 2001
- - ----------------------------------------------------------------------------

Package: ntp
Vulnerability: remote root exploit
Debian-specific: no

Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL> reported that ntp
daemons such as that released with Debian GNU/Linux are vulnerable to a
buffer overflow that can lead to a remote root exploit. A previous
advisory (DSA-045-1) partially addressed this issue, but introduced a
potential denial of service attack. This has been corrected for Debian
2.2 (potato) in ntp version 4.0.99g-2potato2.

We recommend you upgrade your ntp package immediately.

wget url
	will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
- - ------------------------------------

  Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
  architectures.

  Source archives:
    http://security.debian.org/debian-security/dists/stable/updates/main/source/ntp_4.0.99g-2potato2.diff.gz
      MD5 checksum: 33eced8dfeecefed9ecd7a5425dce07f
    http://security.debian.org/debian-security/dists/stable/updates/main/source/ntp_4.0.99g-2potato2.dsc
      MD5 checksum: b704b4528c96b6b22ff2809cd551c221
    http://security.debian.org/debian-security/dists/stable/updates/main/source/ntp_4.0.99g.orig.tar.gz
      MD5 checksum: 6f3132fb4f6a3ee411554d09270f562a

  Architecture-independent files:
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-all/ntp-doc_4.0.99g-2potato2_all.deb
      MD5 checksum: cfa7f1a427fb65dc85eca68f823c95d7
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-all/xntp3_4.0.99g-2potato2_all.deb
      MD5 checksum: 3216aeca42720cd2b00f19ef05dc4ff8

  Alpha architecture:
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-alpha/ntp_4.0.99g-2potato2_alpha.deb
      MD5 checksum: 09b2b4720a150be0421d3126de807b21
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-alpha/ntpdate_4.0.99g-2potato2_alpha.deb
      MD5 checksum: 31d07aa810aa1b6b3a146e75ddb1fc6a

  ARM architecture:
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-arm/ntp_4.0.99g-2potato2_arm.deb
      MD5 checksum: a099db2427b225e880da87c560bfb5b3
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-arm/ntpdate_4.0.99g-2potato2_arm.deb
      MD5 checksum: fb8f5f35fc3b9f3db0d17c7fb302c6dd

  Intel ia32 architecture:
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-i386/ntp_4.0.99g-2potato2_i386.deb
      MD5 checksum: 2a01903f179ccc41a87a8c9495f06747
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-i386/ntpdate_4.0.99g-2potato2_i386.deb
      MD5 checksum: 915a79c8724151e0adf430ca57ad9844

  Motorola 680x0 architecture:
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-m68k/ntp_4.0.99g-2potato2_m68k.deb
      MD5 checksum: dc3826e35dafd4163062f149a63f2bbe
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-m68k/ntpdate_4.0.99g-2potato2_m68k.deb
      MD5 checksum: 6666baa200509e76e0c32dd0166bcb79

  PowerPC architecture:
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-powerpc/ntp_4.0.99g-2potato2_powerpc.deb
      MD5 checksum: 8387ad0831907e26566b2d329425d0e1
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-powerpc/ntpdate_4.0.99g-2potato2_powerpc.deb
      MD5 checksum: 5d90bf20314abc66efe7fea2ecb521d7

  Sun Sparc architecture:
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-sparc/ntp_4.0.99g-2potato2_sparc.deb
      MD5 checksum: b014f4a20d4a0c2ec5e788fafc7dd3cd
    http://security.debian.org/debian-security/dists/stable/updates/main/binary-sparc/ntpdate_4.0.99g-2potato2_sparc.deb
      MD5 checksum: abe31f82a9b202b8880b51b97327cc3b

  These files will be moved into
  ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- - ----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iQCVAwUBOtGkMQ0hVr09l8FJAQEpbwP/UhpylQWshhXzWajpPdfuHKBkPBlgEpXw
15fm9McTPf7PZUUBmwXxoi+cz486biVZXPdichsWbi7pr4w7shmUiH2R9FZ5x5sT
puBy6aG0bHRnS2csROanQObwPf/MX34tFntMD/vJgLJNVDQQ328PBb+VmxkJnrU2
oErPUltAJbM=
=TYE3
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBOtV8Byh9+71yA2DNAQFOQAP/c+iSJBJWoWnU+KAYYtWyQnboshwWrye/
EWAv6RJrMAQXmygnKn4JXDfeflaFcpR6sQWa8MPhMZOHs1QgRH1KfnBx1aHBe60C
s9qtlwykg8PhMHsja/rPeVFxwLKAQJgVE0Rvdm/QXfv8F7ctb0wPoYT+qmJ74Z91
pM2aDzHvAQA=
=Nevw
-----END PGP SIGNATURE-----