exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2005.215

Mandriva Linux Security Advisory 2005.215
Posted Nov 30, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Integer overflows in various applications in the binutils package may allow attackers to execute arbitrary code via a carefully crafted object file.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2005-1704
SHA-256 | 540de918934afc0fe9611a3320d8ad6d2edb153fd397148b8e79442f1afb750c

Mandriva Linux Security Advisory 2005.215

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2005:215
http://www.mandriva.com/security/
_______________________________________________________________________

Package : binutils
Date : November 23, 2005
Affected: 10.1, 10.2, Corporate 2.1, Corporate 3.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

Integer overflows in various applications in the binutils package
may allow attackers to execute arbitrary code via a carefully crafted
object file.

The updated packages have been patched to help address these problems.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1704
_______________________________________________________________________

Updated Packages:

Mandriva Linux 10.1:
708b5397a0f8d66ff7825a87109cee13 10.1/RPMS/binutils-2.15.90.0.3-1.2.101mdk.i586.rpm
cfe970075dabce10d2ea4d8e4fa67aaf 10.1/RPMS/libbinutils2-2.15.90.0.3-1.2.101mdk.i586.rpm
2aa1168d9d0b6c603da3acbdea22fc9c 10.1/RPMS/libbinutils2-devel-2.15.90.0.3-1.2.101mdk.i586.rpm
1f5e832b6ed31c56b3def12e375610da 10.1/SRPMS/binutils-2.15.90.0.3-1.2.101mdk.src.rpm

Mandriva Linux 10.1/X86_64:
e700db501ac6f8f9b2d417c080ab5eea x86_64/10.1/RPMS/binutils-2.15.90.0.3-1.2.101mdk.x86_64.rpm
6abac53d844407ef121691b636b20e1b x86_64/10.1/RPMS/lib64binutils2-2.15.90.0.3-1.2.101mdk.x86_64.rpm
b6f861d559d57c8c5a92e777815e4c73 x86_64/10.1/RPMS/lib64binutils2-devel-2.15.90.0.3-1.2.101mdk.x86_64.rpm
1f5e832b6ed31c56b3def12e375610da x86_64/10.1/SRPMS/binutils-2.15.90.0.3-1.2.101mdk.src.rpm

Mandriva Linux 10.2:
c2a2cfc84982642148278a522ae20398 10.2/RPMS/binutils-2.15.92.0.2-6.2.102mdk.i586.rpm
e026dde17010169f948ffcc7f0f84196 10.2/RPMS/libbinutils2-2.15.92.0.2-6.2.102mdk.i586.rpm
2d0f051e47a0bd56f6472a182d552064 10.2/RPMS/libbinutils2-devel-2.15.92.0.2-6.2.102mdk.i586.rpm
f22b295f02e30b0eb4d12411621c0404 10.2/SRPMS/binutils-2.15.92.0.2-6.2.102mdk.src.rpm

Mandriva Linux 10.2/X86_64:
dc5b9b89c6fb480e4e22cd78aa377a54 x86_64/10.2/RPMS/binutils-2.15.92.0.2-6.2.102mdk.x86_64.rpm
29fbcbe86219392c6e821d8551f918b0 x86_64/10.2/RPMS/lib64binutils2-2.15.92.0.2-6.2.102mdk.x86_64.rpm
5cab7d1ab727c5965faf90c14c16ab88 x86_64/10.2/RPMS/lib64binutils2-devel-2.15.92.0.2-6.2.102mdk.x86_64.rpm
f22b295f02e30b0eb4d12411621c0404 x86_64/10.2/SRPMS/binutils-2.15.92.0.2-6.2.102mdk.src.rpm

Corporate Server 2.1:
4fc16a664f25b5b7ce57938d5b9aa6e1 corporate/2.1/RPMS/binutils-2.13.90.0.10-1.2.C21mdk.i586.rpm
18c1b567a556d8f3f8e8333dca45c971 corporate/2.1/RPMS/libbinutils2-2.13.90.0.10-1.2.C21mdk.i586.rpm
c08be5df6b56231ca1c4436a805d6b81 corporate/2.1/RPMS/libbinutils2-devel-2.13.90.0.10-1.2.C21mdk.i586.rpm
dbc46ffe4e6f710d355796211bdff83c corporate/2.1/SRPMS/binutils-2.13.90.0.10-1.2.C21mdk.src.rpm

Corporate Server 2.1/X86_64:
1561acb857e03d7a167af0945efe7650 x86_64/corporate/2.1/RPMS/binutils-2.13.90.0.10-1.2.C21mdk.x86_64.rpm
e683343df371de35d026cbdba7dbc898 x86_64/corporate/2.1/RPMS/libbinutils2-2.13.90.0.10-1.2.C21mdk.x86_64.rpm
9c53bf3a8c5a303c2f97d06216dbf30c x86_64/corporate/2.1/RPMS/libbinutils2-devel-2.13.90.0.10-1.2.C21mdk.x86_64.rpm
dbc46ffe4e6f710d355796211bdff83c x86_64/corporate/2.1/SRPMS/binutils-2.13.90.0.10-1.2.C21mdk.src.rpm

Corporate 3.0:
ef926843f1e4141cecbb5a77015d5092 corporate/3.0/RPMS/binutils-2.14.90.0.7-2.2.C30mdk.i586.rpm
494a84d96695e9b3d5fe98dec372cb56 corporate/3.0/RPMS/libbinutils2-2.14.90.0.7-2.2.C30mdk.i586.rpm
0deb09a9ee7a41172fbf242cf40b9f10 corporate/3.0/RPMS/libbinutils2-devel-2.14.90.0.7-2.2.C30mdk.i586.rpm
e57a1ef31c7d86749bb93f2c5632c168 corporate/3.0/SRPMS/binutils-2.14.90.0.7-2.2.C30mdk.src.rpm

Corporate 3.0/X86_64:
c999b0c9026df1c47e2ecfafb3396973 x86_64/corporate/3.0/RPMS/binutils-2.14.90.0.7-2.2.C30mdk.x86_64.rpm
b2eacb13d69dc3a3f24ba0d466a0a7d2 x86_64/corporate/3.0/RPMS/lib64binutils2-2.14.90.0.7-2.2.C30mdk.x86_64.rpm
603859440efa6b87a0b66954e01977b9 x86_64/corporate/3.0/RPMS/lib64binutils2-devel-2.14.90.0.7-2.2.C30mdk.x86_64.rpm
e57a1ef31c7d86749bb93f2c5632c168 x86_64/corporate/3.0/SRPMS/binutils-2.14.90.0.7-2.2.C30mdk.src.rpm

Multi Network Firewall 2.0:
9eab0b74b586e443a0e533af8cca5fa4 mnf/2.0/RPMS/binutils-2.14.90.0.7-2.2.M20mdk.i586.rpm
93047308f094f014b37aee12534c43df mnf/2.0/RPMS/libbinutils2-2.14.90.0.7-2.2.M20mdk.i586.rpm
0ccb5c7d9a158dbce80de957aa7b0b04 mnf/2.0/SRPMS/binutils-2.14.90.0.7-2.2.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDhKsfmqjQ0CJFipgRAgbcAJ44oqybcmVb8HGLmJsoOi7Pnc34vACg15Y6
wbya/4Q74mmWUW84jwoMa0E=
=Hfll
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close