USN-98-1: OpenSLP vulnerabilities
Posted on: 03/17/2005 01:53 PM

An OpenSLP security update is available for Ubuntu Linux

==========================================================
Ubuntu Security Notice USN-98-1 March 17, 2005
openslp vulnerabilities
http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032534.html
==========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:

libslp1
slpd

The problem can be corrected by upgrading the affected package to version 1.0.11-7ubuntu0.1. In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

The SuSE Security Team discovered several buffer overflows in the OpenSLP server and client library. By sending specially crafted SLP packets, a remote attacker could exploit this to crash the SLP server or execute arbitrary code with the privileges of the "daemon" user. Likewise, a malicious SLP server could exploit the client library vulnerabilities to execute arbitrary code with the privileges of the user running the SLP client application.

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/o/openslp/openslp_1.0.11-7ubuntu0.1.diff.gz
Size/MD5: 151039 eb727a65716e86e757e34748aa24cc45
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/openslp_1.0.11-7ubuntu0.1.dsc
Size/MD5: 655 5ff8151d34a2b861a3d9f614072b92ca
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/openslp_1.0.11.orig.tar.gz
Size/MD5: 608138 0ec965956ad1f66850f050b19c828b55

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/o/openslp/openslp-doc_1.0.11-7ubuntu0.1_all.deb
Size/MD5: 95946 dffab2db867d3604939d692ffb3904f7

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp-dev_1.0.11-7ubuntu0.1_amd64.deb
Size/MD5: 65082 9a8acfb6e05f13688bb9d54c85c3593b
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp1_1.0.11-7ubuntu0.1_amd64.deb
Size/MD5: 47610 a536d6a50a6d64453606178ec4f17ef1
http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slpd_1.0.11-7ubuntu0.1_amd64.deb
Size/MD5: 70866 7f52d0fd37f71aec8e1940e1e34a9b63
http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slptool_1.0.11-7ubuntu0.1_amd64.deb
Size/MD5: 26546 44d2d312536407a1c2af16b265d04035

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp-dev_1.0.11-7ubuntu0.1_i386.deb
Size/MD5: 62000 fd04134fb0f1f98c2662d35ff340041d
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp1_1.0.11-7ubuntu0.1_i386.deb
Size/MD5: 45890 d703c3f516e7e67d918579f20c8c45aa
http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slpd_1.0.11-7ubuntu0.1_i386.deb
Size/MD5: 65100 ec67710b0585c62c7142f036256c9853
http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slptool_1.0.11-7ubuntu0.1_i386.deb
Size/MD5: 26086 d83af46fc9e6e9981a6e5c5a1d23fdad

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp-dev_1.0.11-7ubuntu0.1_powerpc.deb
Size/MD5: 66202 ad95b923ad7b89cadb37972ccbe10443
http://security.ubuntu.com/ubuntu/pool/main/o/openslp/libslp1_1.0.11-7ubuntu0.1_powerpc.deb
Size/MD5: 48928 ca8dfeddadab73241b9a3f36c6989e0d
http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slpd_1.0.11-7ubuntu0.1_powerpc.deb
Size/MD5: 72190 08e568c75979eaa01619668b6b68d06b
http://security.ubuntu.com/ubuntu/pool/universe/o/openslp/slptool_1.0.11-7ubuntu0.1_powerpc.deb
Size/MD5: 28076 f507323a5ffa3082f34f610f911fd05a


Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/usn_98_1_openslp_vulnerabilities.html)