Date: 12 December 2007
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2007.1002 -- [UNIX/Linux][Debian]
New libnss-ldap packages fix denial of service
12 December 2007
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: libnss-ldap
Publisher: Debian
Operating System: Debian GNU/Linux 4.0
Debian GNU/Linux 3.1
UNIX variants (UNIX, Linux, OSX)
Impact: Denial of Service
Access: Remote/Unauthenticated
CVE Names: CVE-2007-5794
Original Bulletin: http://www.debian.org/security/2007/dsa-1430
Comment: This advisory references vulnerabilities in products which run on
platforms other than Debian. It is recommended that
administrators running libnss-ldap check for an updated version of
the software for their operating system.
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1430-1 security@debian.org
http://www.debian.org/security/ Steve Kemp
December 11, 2007 http://www.debian.org/security/faq
- - ------------------------------------------------------------------------
Package : libnss-ldap
Vulnerability : denial of service
Problem type : local
Debian-specific: no
CVE Id(s) : CVE-2007-5794
Debian Bug : 453868
It was reported that a race condition exists in libnss-ldap, an
NSS module for using LDAP as a naming service, which could cause
denial of service attacks when applications use pthreads.
This problem was spotted in the dovecot IMAP/POP server but
potentially affects more programs.
For the stable distribution (etch), this problem has been fixed in version
251-7.5etch1.
For the old stable distribution (sarge), this problem has been fixed in
version 238-1sarge1.
For the unstable distribution (sid), this problem has been fixed in
version 256-1.
We recommend that you upgrade your libnss-ldap package.
Upgrade instructions
- - --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
- - --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238.orig.tar.gz
Size/MD5 checksum: 219945 97fd929b381329b972b3c3ddca5a4bbf
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1.diff.gz
Size/MD5 checksum: 26236 c7191ee3845dc23ccf2712e78daed8f1
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1.dsc
Size/MD5 checksum: 681 3176fefa1d8d04afa9d3b458e40694a6
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_alpha.deb
Size/MD5 checksum: 86756 30a9c1691dcec614e36fdea923ba3906
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_amd64.deb
Size/MD5 checksum: 80218 18d9da468326040f466c10cac6f50734
arm architecture (ARM)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_arm.deb
Size/MD5 checksum: 79216 adf473266dd1de600cc0360f697ec7d2
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_hppa.deb
Size/MD5 checksum: 86324 f98ade45a20c5426ef30cb1290e34164
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_i386.deb
Size/MD5 checksum: 78894 7bb744d57899867a0b1c326372de76ce
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_ia64.deb
Size/MD5 checksum: 91930 d25cce59d45f8b8dc90b0fe3fcbf3ce0
m68k architecture (Motorola Mc680x0)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_m68k.deb
Size/MD5 checksum: 76894 3c574bc294eb02c337664de43e814f7f
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_mips.deb
Size/MD5 checksum: 80482 0e54d051dde87e3b7984650c47bc3b3e
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_mipsel.deb
Size/MD5 checksum: 80594 9f3f4b5d6d7c9e6f84edd9ab40767e04
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_powerpc.deb
Size/MD5 checksum: 81652 7ca152887a041fc3dc674a77e707d23f
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_s390.deb
Size/MD5 checksum: 83806 eab2386a51d35e31a4dd7fd0ed832a6d
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_238-1sarge1_sparc.deb
Size/MD5 checksum: 79224 7d2ec91b89037fd137e98d3640ba1bb4
Debian GNU/Linux 4.0 alias etch
- - -------------------------------
Source archives:
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1.diff.gz
Size/MD5 checksum: 149322 04aa24732e69f40e5c3ab629b7e412d4
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251.orig.tar.gz
Size/MD5 checksum: 228931 a80718b3f7cf46f2579a26f9d6fbcd46
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1.dsc
Size/MD5 checksum: 683 007acb586d8bf61058c446a08aae4804
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_alpha.deb
Size/MD5 checksum: 108812 1150911f5446d2bc7838fd3d9d56329d
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_amd64.deb
Size/MD5 checksum: 105206 7f2e2292e5c213a4d59e0c7240a9ca7e
arm architecture (ARM)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_arm.deb
Size/MD5 checksum: 103946 bb4984bf517834f0278f00e8ba32a4ba
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_hppa.deb
Size/MD5 checksum: 111288 2a7f758efdf03c296b2feea08205cdc7
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_i386.deb
Size/MD5 checksum: 103732 0f29d1991d204b4a710e5f74bf056984
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_ia64.deb
Size/MD5 checksum: 120362 e5649299793b90c3987305ac2212afad
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_mips.deb
Size/MD5 checksum: 105148 1f42e34610dc974a6a5ff19a2dff1b24
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_mipsel.deb
Size/MD5 checksum: 105360 af1ff4fd5a543b50f704a022798ebed0
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_powerpc.deb
Size/MD5 checksum: 106458 13b702d831bde6e52507fdd466573122
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_s390.deb
Size/MD5 checksum: 108466 10bc9129adbc56dd6c75569fc27a221c
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/libn/libnss-ldap/libnss-ldap_251-7.5etch1_sparc.deb
Size/MD5 checksum: 103134 12c84546a715bca647b86943a226b361
These files will probably be moved into the stable distribution on
its next update.
- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHXw1gwM/Gs81MDZ0RAgmGAJ9EakBwTenHBVG3gs1z1YsoicTkuwCfdL0m
yV3scULGyEZapb3yJ2qoL6Y=
=EnHc
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBR19cFyh9+71yA2DNAQL9IgQAnu2FjR36WdAfdBegtJwFF+/HXKGbbrMr
V0rP+10ytrnc7Fg+9r/zpviOBbNH4OWBZ6X97w/lBw8+V3o8dTeBsygukcuPbkUW
7Y90YxiyZwsaqm3QCLlaMQ9rC7eQaG7FzBWkaGdgOsbW+PmTK1yhxII97Qu6ZI72
hzS1C5LAW3w=
=C+FS
-----END PGP SIGNATURE-----
|