Exploit the possiblities

Mandriva Linux Security Advisory 2015-229

Mandriva Linux Security Advisory 2015-229
Posted May 6, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-229 - It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables. A remote, unauthenticated attacker could exploit this flaw to cause a crash or, potentially, execute arbitrary code.

tags | advisory, remote, arbitrary
systems | linux, mandriva
MD5 | a58124f4a4af8a666aaca978bb9ec8e4

Mandriva Linux Security Advisory 2015-229

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2015:229
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : net-snmp
Date : May 6, 2015
Affected: Business Server 1.0, Business Server 2.0
_______________________________________________________________________

Problem Description:

Updated net-snmp packages fix security vulnerability:

It was discovered that the snmp_pdu_parse() function could leave
incompletely parsed varBind variables in the list of variables. A
remote, unauthenticated attacker could exploit this flaw to cause a
crash or, potentially, execute arbitrary code.
_______________________________________________________________________

References:

http://advisories.mageia.org/MGASA-2015-0187.html
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 1/X86_64:
e9e6514a37583dcd8caf948a2975ee5d mbs1/x86_64/lib64net-snmp30-5.7.2-1.3.mbs1.x86_64.rpm
d58a677b3359c3b9f2a6221bc71a4093 mbs1/x86_64/lib64net-snmp-devel-5.7.2-1.3.mbs1.x86_64.rpm
506af7ceaea330ac9e6009e51f91a23e mbs1/x86_64/lib64net-snmp-static-devel-5.7.2-1.3.mbs1.x86_64.rpm
12b87dc4dbd4f7eac59ee150eeb7be3d mbs1/x86_64/net-snmp-5.7.2-1.3.mbs1.x86_64.rpm
692233b0f7738441cee192c23917fc3f mbs1/x86_64/net-snmp-mibs-5.7.2-1.3.mbs1.x86_64.rpm
5cb8de6d94a82083dec56b3c5fadf18f mbs1/x86_64/net-snmp-tkmib-5.7.2-1.3.mbs1.x86_64.rpm
4d5d1e31fe98a83a25aca06779741426 mbs1/x86_64/net-snmp-trapd-5.7.2-1.3.mbs1.x86_64.rpm
164283a0c2fc778853e04a0d96d85193 mbs1/x86_64/net-snmp-utils-5.7.2-1.3.mbs1.x86_64.rpm
76ff7eeefb6243ba23019170d5869a1f mbs1/x86_64/perl-NetSNMP-5.7.2-1.3.mbs1.x86_64.rpm
7985facf83ea1000bee08b4904ab59ac mbs1/x86_64/python-netsnmp-5.7.2-1.3.mbs1.x86_64.rpm
a9426c006bb7dba9befa25a6f175848b mbs1/SRPMS/net-snmp-5.7.2-1.3.mbs1.src.rpm

Mandriva Business Server 2/X86_64:
96933cae4f472807871a938057737901 mbs2/x86_64/lib64net-snmp30-5.7.2-14.2.mbs2.x86_64.rpm
43a621e48ec1a90f9d19d2e5c41b441a mbs2/x86_64/lib64net-snmp-devel-5.7.2-14.2.mbs2.x86_64.rpm
eb85a240ee2fdaf0e18186af60364527 mbs2/x86_64/lib64net-snmp-static-devel-5.7.2-14.2.mbs2.x86_64.rpm
29293d70a79ac2c2f2d3b7498795d9df mbs2/x86_64/net-snmp-5.7.2-14.2.mbs2.x86_64.rpm
fb1d4d5cf0bd8bcd8507a9504f3cb1f7 mbs2/x86_64/net-snmp-mibs-5.7.2-14.2.mbs2.x86_64.rpm
84907f5a327dca8f65cfdbde383cf313 mbs2/x86_64/net-snmp-tkmib-5.7.2-14.2.mbs2.x86_64.rpm
2645307f112b55f39cdce0770f2c4f1d mbs2/x86_64/net-snmp-trapd-5.7.2-14.2.mbs2.x86_64.rpm
324e814089995d267057def7ac9ffffc mbs2/x86_64/net-snmp-utils-5.7.2-14.2.mbs2.x86_64.rpm
5f67cdc5934f817c00905d30d7c6f04e mbs2/x86_64/perl-NetSNMP-5.7.2-14.2.mbs2.x86_64.rpm
f6e73d5addff4491699759064e01d1a4 mbs2/x86_64/python-netsnmp-5.7.2-14.2.mbs2.x86_64.rpm
fa0385f2c4a1ef79f753a1d6cf53292e mbs2/SRPMS/net-snmp-5.7.2-14.2.mbs2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVSfMpmqjQ0CJFipgRArE1AJ4wvx00/5uBh9Ha4ELG3dvic2uD+QCeIr/x
s5NKq7ytMV+Uhun8ldx8iIA=
=jYup
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close