exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 17222

Secunia Security Advisory 17222
Posted Oct 19, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for netpbm. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system.

tags | advisory, denial of service
systems | linux, ubuntu
SHA-256 | 6091746a5d7dbfd8037d9bf2c84540c952626845487dee11f61f340627dbe003

Secunia Security Advisory 17222

Change Mirror Download


TITLE:
Ubuntu update for netpbm

SECUNIA ADVISORY ID:
SA17222

VERIFY ADVISORY:
http://secunia.com/advisories/17222/

CRITICAL:
Moderately critical

IMPACT:
DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Ubuntu Linux 4.10
http://secunia.com/product/4491/
Ubuntu Linux 5.04
http://secunia.com/product/5036/

DESCRIPTION:
Ubuntu has issued an update for netpbm. This fixes a vulnerability,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service) or compromise a user's system.

For more information:
SA17221

SOLUTION:
Apply updated packages.

-- Ubuntu 4.10 (Warty Warthog) --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0-5ubuntu0.2.diff.gz
Size/MD5: 43800 4dc567315041ddfafb4f7c8f513bcbb8
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0-5ubuntu0.2.dsc
Size/MD5: 760 47b4d65a19c21dce33a8ca5b09098353
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0.orig.tar.gz
Size/MD5: 1926538 985e9f6d531ac0b2004f5cbebdeea87d

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-5ubuntu0.2_amd64.deb
Size/MD5: 117802 503f0cf14d2195de71ce651f1e4cb213
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-5ubuntu0.2_amd64.deb
Size/MD5: 68544 8944dc6ce9718967f70b5cec1b52c49d
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-5ubuntu0.2_amd64.deb
Size/MD5: 118194 22baca57b70b2afeacb8e26729a61d00
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-5ubuntu0.2_amd64.deb
Size/MD5: 76926 35566ec63583650875ef38f1da6ca89f
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-5ubuntu0.2_amd64.deb
Size/MD5: 1276546 0ec021850356b6ced6edaacc97945cfd

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-5ubuntu0.2_i386.deb
Size/MD5: 108700 27cc3f4ec7b7282b5e0379ed59b9a89e
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-5ubuntu0.2_i386.deb
Size/MD5: 63416 f8c3e3eae7a756f1d2b7990bae52f045
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-5ubuntu0.2_i386.deb
Size/MD5: 108838 b86e4ac8bd02fea0c0bcc6aeb70d27eb
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-5ubuntu0.2_i386.deb
Size/MD5: 70510 c18691ec27cf464e85ba300ca4d9336e
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-5ubuntu0.2_i386.deb
Size/MD5: 1182526 ae05b3f0bff5bc5023c06dcb20f6420d

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-5ubuntu0.2_powerpc.deb
Size/MD5: 123450 14fb0a6b7f23fdbd2bfcf2a7d1b7ff81
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-5ubuntu0.2_powerpc.deb
Size/MD5: 70888 183ad6e6a06931546aaf61e3a4b18a5f
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-5ubuntu0.2_powerpc.deb
Size/MD5: 123804 329a5a72aebd077af324572164682f63
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-5ubuntu0.2_powerpc.deb
Size/MD5: 82914 cd17b36d585b74f981cf60a114590cca
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-5ubuntu0.2_powerpc.deb
Size/MD5: 1521750 2b8a7d6de621d3c6d3b8cd5c08696152

-- Ubuntu 5.04 (Hoary Hedgehog) --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0-8ubuntu0.2.diff.gz
Size/MD5: 45618 dbc755c12a206a568cb9ae9aca66940f
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0-8ubuntu0.2.dsc
Size/MD5: 755 06eb537fd60b01cbb11a8880784fd60e
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm-free_10.0.orig.tar.gz
Size/MD5: 1926538 985e9f6d531ac0b2004f5cbebdeea87d

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-8ubuntu0.2_amd64.deb
Size/MD5: 118166 0bf95304d5065d615ed018de0b9cd922
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-8ubuntu0.2_amd64.deb
Size/MD5: 68912 ae2423d1ef5f0121bab95bc6e329f87a
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-8ubuntu0.2_amd64.deb
Size/MD5: 118540 0648911f2721bd0c75a4d7ace1fa70a4
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-8ubuntu0.2_amd64.deb
Size/MD5: 77258 2551bfcefd60ec8e8345d4428b6ab470
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-8ubuntu0.2_amd64.deb
Size/MD5: 1277566 901de41c9fff67f8fcda5d145b020123

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-8ubuntu0.2_i386.deb
Size/MD5: 109086 1d53a295fe6284fb71a4e3bd8edc588a
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-8ubuntu0.2_i386.deb
Size/MD5: 63816 a00c3bf07303ec2e33fb65169b1e41ff
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-8ubuntu0.2_i386.deb
Size/MD5: 109210 830c462141a5ded03b75466ab070c119
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-8ubuntu0.2_i386.deb
Size/MD5: 70854 56139e102e3d054bfec68dfeef3f7e77
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-8ubuntu0.2_i386.deb
Size/MD5: 1175132 e1a599e6755b8c33f0e12ed1cc13820f

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10-dev_10.0-8ubuntu0.2_powerpc.deb
Size/MD5: 123704 cb98b033340ef2df0f7fee4985a1b354
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm10_10.0-8ubuntu0.2_powerpc.deb
Size/MD5: 71282 820b73d9f97eb01ddc76efa0e9ef7075
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9-dev_10.0-8ubuntu0.2_powerpc.deb
Size/MD5: 124060 ad9aedd0b1782c972ad1aef051dc8c71
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/libnetpbm9_10.0-8ubuntu0.2_powerpc.deb
Size/MD5: 83474 9f76ab656a5426df156366286767e8c5
http://security.ubuntu.com/ubuntu/pool/main/n/netpbm-free/netpbm_10.0-8ubuntu0.2_powerpc.deb
Size/MD5: 1521478 0336c4c312eac0c1a93e3268ae6160c5

ORIGINAL ADVISORY:
http://www.ubuntu.com/usn/usn-210-1

OTHER REFERENCES:
SA17221:
http://secunia.com/advisories/17221/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close