Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2002.590 -- Debian Security Advisory DSA 180-1 New NIS packages fix information leak 22 October 2002 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: NIS Vendor: Debian Operating System: Debian GNU/Linux 3.0 Debian GNU/Linux 2.2 Impact: Read-only Data Access Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 180-1 security@debian.org http://www.debian.org/security/ Martin Schulze October 21st, 2002 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : nis Vulnerability : information leak Problem-Type : remote Debian-specific: no Thorsten Kukuck discovered a problem in the ypserv program which is part of the Network Information Services (NIS). A memory leak in all versions of ypserv prior to 2.5 is remotely exploitable. When a malicious user could request a non-existing map the server will leak parts of an old domainname and mapname. This problem has been fixed in version 3.9-6.1 for the current stable distribution (woody), in version 3.8-2.1 for the old stable distribution (potato) and in version 3.9-6.2 for the unstable distribution (sid). We recommend that you upgrade your nis package. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 2.2 alias potato - - --------------------------------- Source archives: http://security.debian.org/pool/updates/main/n/nis/nis_3.8-2.1.dsc Size/MD5 checksum: 549 0648773dc9405dfc7db374119fdfff29 http://security.debian.org/pool/updates/main/n/nis/nis_3.8-2.1.diff.gz Size/MD5 checksum: 20525 0a95b9ded7ff489c1286063d6072d457 http://security.debian.org/pool/updates/main/n/nis/nis_3.8.orig.tar.gz Size/MD5 checksum: 497044 69bd8aa6b24cb22266cdc04354d3e287 Alpha architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.8-2.1_alpha.deb Size/MD5 checksum: 243476 2e4e1daacb4d89b0447eaacd2ba524eb ARM architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.8-2.1_arm.deb Size/MD5 checksum: 179622 68949d909772b5dd84a8b81090bd51bd Intel IA-32 architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.8-2.1_i386.deb Size/MD5 checksum: 165064 bae6f9b96c61c2dea0f23acb96795e3a Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.8-2.1_m68k.deb Size/MD5 checksum: 158486 5601d33852631af0e5d742724cdc21fe PowerPC architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.8-2.1_powerpc.deb Size/MD5 checksum: 169010 9ff45f7490b1832dea2a48ef4549c707 Sun Sparc architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.8-2.1_sparc.deb Size/MD5 checksum: 182990 07989d24beb219f9c5dc881b2e7439e2 Debian GNU/Linux 3.0 alias woody - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1.dsc Size/MD5 checksum: 583 39867a9d09bec5430a09c1a797af267c http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1.diff.gz Size/MD5 checksum: 39172 5ffbfd98d5a2b795842800723c987e67 http://security.debian.org/pool/updates/main/n/nis/nis_3.9.orig.tar.gz Size/MD5 checksum: 495695 b4d1c45619d8e3b20ef4b6032911a78c Alpha architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1_alpha.deb Size/MD5 checksum: 203838 c1d79fbf7a7bc9b95ae6ea3c0355ba0e ARM architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1_arm.deb Size/MD5 checksum: 165466 c73c0ea67dcf72d802164fadb52ed1f4 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1_i386.deb Size/MD5 checksum: 166214 e0b4d5496ea0063c2a2ab184d0ca8688 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1_ia64.deb Size/MD5 checksum: 236278 2573ec9f729f55634392d80c7ca7fdcf HP Precision architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1_hppa.deb Size/MD5 checksum: 182482 b23d0bb92aee63825c186068c6971c17 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1_m68k.deb Size/MD5 checksum: 160114 70f5226204ebc3dadf9baacc3f7ea084 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1_mips.deb Size/MD5 checksum: 176766 27275782bbb48e3ea8f230d5b7a55974 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1_mipsel.deb Size/MD5 checksum: 176782 d1b102f9a84b0213c89a8d0f7e63bf60 PowerPC architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1_powerpc.deb Size/MD5 checksum: 168290 9f615b8886db258eba3d62c2462095de IBM S/390 architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1_s390.deb Size/MD5 checksum: 166598 32c8445c48db60c7e86cf102b27189f2 Sun Sparc architecture: http://security.debian.org/pool/updates/main/n/nis/nis_3.9-6.1_sparc.deb Size/MD5 checksum: 179352 8b38cd4b37a31316457312c7fac6b1ce These files will probably be moved into the stable distribution on its next revision. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE9tBMPW5ql+IAeqTIRAkKQAKCNRupUGZ+gRdX3vGIfBp21sdXNuwCfWKEI vJecJEUW4mRi70hpsPFaOn0= =Gsjw - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBPbVe7ih9+71yA2DNAQEX6AP/XQmTBFLYRq3GwyQ7FhH/2+w/eAWqwA2H LMH8fvmeTe3V3FAYOvjlRvANPBuz8+VySDgoO0DYW3mxypuOepNqv+mqfb8mv+5v aW/kQC8NetpCW39e1sHzbAinnCHc5dxsk/WeW2KNuTf+YNzqBluxVSt2Fn/jbTkW +l0V3W5EZ9E= =N9Yp -----END PGP SIGNATURE-----