what you don't know can hurt you

Secunia Security Advisory 17122

Secunia Security Advisory 17122
Posted Oct 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for w3c-libwww. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
MD5 | df988b310e646b7514238ab01ae5835c

Secunia Security Advisory 17122

Change Mirror Download


TITLE:
Fedora update for w3c-libwww

SECUNIA ADVISORY ID:
SA17122

VERIFY ADVISORY:
http://secunia.com/advisories/17122/

CRITICAL:
Less critical

IMPACT:
DoS

WHERE:
>From remote

OPERATING SYSTEM:
Fedora Core 3
http://secunia.com/product/4222/
Fedora Core 4
http://secunia.com/product/5251/

DESCRIPTION:
Fedora has issued an update for w3c-libwww. This fixes a
vulnerability, which potentially can be exploited by malicious people
to cause a DoS (Denial of Service).

For more information:
SA17119

SOLUTION:
Apply updated packages.

Fedora Core 3:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

3eacd9ce41d9764eb03cda8198262998
SRPMS/w3c-libwww-5.4.0-10.0.FC3.1.src.rpm
a5f4fc0d2de25d1b89ce79ca481704bd
x86_64/w3c-libwww-5.4.0-10.0.FC3.1.x86_64.rpm
3ce9611318ce309f12a5c4b7901ec10a
x86_64/w3c-libwww-devel-5.4.0-10.0.FC3.1.x86_64.rpm
5d57b4e4e4bb9defa67946d560696455
x86_64/w3c-libwww-apps-5.4.0-10.0.FC3.1.x86_64.rpm
605f7f6948ea02a97b2e6966ae72af88
x86_64/debug/w3c-libwww-debuginfo-5.4.0-10.0.FC3.1.x86_64.rpm
dfdbd14a8f09d83cf4accc17b7cf5dcd
x86_64/w3c-libwww-5.4.0-10.0.FC3.1.i386.rpm
dfdbd14a8f09d83cf4accc17b7cf5dcd
i386/w3c-libwww-5.4.0-10.0.FC3.1.i386.rpm
d0497449e253d2f884fc2795fb13127e
i386/w3c-libwww-devel-5.4.0-10.0.FC3.1.i386.rpm
bc65e94645c4b9716f7f0e6648bb434e
i386/w3c-libwww-apps-5.4.0-10.0.FC3.1.i386.rpm
e588b958e79620a3321d0291b654f1b3
i386/debug/w3c-libwww-debuginfo-5.4.0-10.0.FC3.1.i386.rpm

Fedora Core 4:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/

262c0d05cabd1d2c9287ef95cfb6bbeb
SRPMS/w3c-libwww-5.4.0-13.0.FC4.1.src.rpm
f3c183f8df10263b4f48f28d1e4d0ef8
ppc/w3c-libwww-5.4.0-13.0.FC4.1.ppc.rpm
ba16e6511941fe94412b72a67db6b5a8
ppc/w3c-libwww-devel-5.4.0-13.0.FC4.1.ppc.rpm
c7b8dbbd35713ff49386b3a07214e242
ppc/w3c-libwww-apps-5.4.0-13.0.FC4.1.ppc.rpm
74c70aa629902b372a9bbbe0f31e184f
ppc/debug/w3c-libwww-debuginfo-5.4.0-13.0.FC4.1.ppc.rpm
59f9822598e2de59adda0d1478b3aa09
ppc/w3c-libwww-5.4.0-13.0.FC4.1.ppc64.rpm
0d057899d34c9c6d6c664c206719d1ed
x86_64/w3c-libwww-5.4.0-13.0.FC4.1.x86_64.rpm
9e0c7bff81deba4654cac3c4a7b11a05
x86_64/w3c-libwww-devel-5.4.0-13.0.FC4.1.x86_64.rpm
aab20a9b7cb6197e546cf3ea8c1ad4bb
x86_64/w3c-libwww-apps-5.4.0-13.0.FC4.1.x86_64.rpm
e61340883a3445983b2fc168c269fa33
x86_64/debug/w3c-libwww-debuginfo-5.4.0-13.0.FC4.1.x86_64.rpm
f63c23021f1e9c047ed9b5b22d782c3b
x86_64/w3c-libwww-5.4.0-13.0.FC4.1.i386.rpm
f63c23021f1e9c047ed9b5b22d782c3b
i386/w3c-libwww-5.4.0-13.0.FC4.1.i386.rpm
067487352f16347413becdc4e0090bd3
i386/w3c-libwww-devel-5.4.0-13.0.FC4.1.i386.rpm
d7189ef6a77103724d7a8f67fe9eab81
i386/w3c-libwww-apps-5.4.0-13.0.FC4.1.i386.rpm
f5a34912b15d4aae5da716aad8289df0
i386/debug/w3c-libwww-debuginfo-5.4.0-13.0.FC4.1.i386.rpm

ORIGINAL ADVISORY:
https://www.redhat.com/archives/fedora-announce-list/2005-October/msg00025.html
https://www.redhat.com/archives/fedora-announce-list/2005-October/msg00024.html

OTHER REFERENCES:
SA17119:
http://secunia.com/advisories/17119/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

June 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    10 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    15 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close