================================================== =========
Ubuntu Security Notice USN-98-1 March 17, 2005
openslp vulnerabilities
http://lists.grok.org.uk/pipermail/f...ch/032534.html
================================================== =========

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:

libslp1
slpd

The problem can be corrected by upgrading the affected package to
version 1.0.11-7ubuntu0.1. In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

The SuSE Security Team discovered several buffer overflows in the
OpenSLP server and client library. By sending specially crafted SLP
packets, a remote attacker could exploit this to crash the SLP server
or execute arbitrary code with the privileges of the "daemon" user.
Likewise, a malicious SLP server could exploit the client library
vulnerabilities to execute arbitrary code with the privileges of the
user running the SLP client application.

Source archives:

http://security.ubuntu.com/ubuntu/po...ntu0.1.diff.gz
Size/MD5: 151039 eb727a65716e86e757e34748aa24cc45
http://security.ubuntu.com/ubuntu/po...7ubuntu0.1.dsc
Size/MD5: 655 5ff8151d34a2b861a3d9f614072b92ca
http://security.ubuntu.com/ubuntu/po...11.orig.tar.gz
Size/MD5: 608138 0ec965956ad1f66850f050b19c828b55

Architecture independent packages:

http://security.ubuntu.com/ubuntu/po...ntu0.1_all.deb
Size/MD5: 95946 dffab2db867d3604939d692ffb3904f7

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/po...u0.1_amd64.deb
Size/MD5: 65082 9a8acfb6e05f13688bb9d54c85c3593b
http://security.ubuntu.com/ubuntu/po...u0.1_amd64.deb
Size/MD5: 47610 a536d6a50a6d64453606178ec4f17ef1
http://security.ubuntu.com/ubuntu/po...u0.1_amd64.deb
Size/MD5: 70866 7f52d0fd37f71aec8e1940e1e34a9b63
http://security.ubuntu.com/ubuntu/po...u0.1_amd64.deb
Size/MD5: 26546 44d2d312536407a1c2af16b265d04035

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/po...tu0.1_i386.deb
Size/MD5: 62000 fd04134fb0f1f98c2662d35ff340041d
http://security.ubuntu.com/ubuntu/po...tu0.1_i386.deb
Size/MD5: 45890 d703c3f516e7e67d918579f20c8c45aa
http://security.ubuntu.com/ubuntu/po...tu0.1_i386.deb
Size/MD5: 65100 ec67710b0585c62c7142f036256c9853
http://security.ubuntu.com/ubuntu/po...tu0.1_i386.deb
Size/MD5: 26086 d83af46fc9e6e9981a6e5c5a1d23fdad

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/po....1_powerpc.deb
Size/MD5: 66202 ad95b923ad7b89cadb37972ccbe10443
http://security.ubuntu.com/ubuntu/po....1_powerpc.deb
Size/MD5: 48928 ca8dfeddadab73241b9a3f36c6989e0d
http://security.ubuntu.com/ubuntu/po....1_powerpc.deb
Size/MD5: 72190 08e568c75979eaa01619668b6b68d06b
http://security.ubuntu.com/ubuntu/po....1_powerpc.deb
Size/MD5: 28076 f507323a5ffa3082f34f610f911fd05a

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
http://lists.ubuntu.com/mailman/list...urity-announce

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFCOcKYDecnbV4Fd/IRAhBnAKCtIXAFUtkWix1TddUuI6wjzBVEIgCbB6j0
LlIZARXdjcTOd1TEWC0lHOc=
=/yPn
-----END PGP SIGNATURE-----