exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 17814

Secunia Security Advisory 17814
Posted Dec 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for w3c-libwww. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
SHA-256 | dd1c986a8866394aa4d471eb3534d4cd0d8a03f87aa8ae5a767e4104d99997ff

Secunia Security Advisory 17814

Change Mirror Download


TITLE:
Ubuntu update for w3c-libwww

SECUNIA ADVISORY ID:
SA17814

VERIFY ADVISORY:
http://secunia.com/advisories/17814/

CRITICAL:
Less critical

IMPACT:
DoS

WHERE:
>From remote

OPERATING SYSTEM:
Ubuntu Linux 5.04
http://secunia.com/product/5036/
Ubuntu Linux 4.10
http://secunia.com/product/4491/

DESCRIPTION:
Ubuntu has issued an update for w3c-libwww. This fixes a
vulnerability, which potentially can be exploited by malicious people
to cause a DoS (Denial of Service).

For more information:
SA17119

SOLUTION:
Apply updated packages.

-- Ubuntu 4.10 --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/w3c-libwww_5.4.0-9ubuntu0.4.10.diff.gz
Size/MD5: 510355 15f9592db51864e0e060fe1f3a6f63f6
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/w3c-libwww_5.4.0-9ubuntu0.4.10.dsc
Size/MD5: 714 637bf331ecefe995ae2ef4b280e2bc2b
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/w3c-libwww_5.4.0.orig.tar.gz
Size/MD5: 1127018 a6073cda765b7f9fa0970eb92757f6bb

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-dev_5.4.0-9ubuntu0.4.10_amd64.deb
Size/MD5: 684660 313c59ca507046ff8a2b66ac49d0ac7e
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-ssl-dev_5.4.0-9ubuntu0.4.10_amd64.deb
Size/MD5: 692530 d06eb91e03a400e23ae94d8466965bc5
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-ssl0_5.4.0-9ubuntu0.4.10_amd64.deb
Size/MD5: 512118 2646446086e15f870cc8930d39fa65ad
http://security.ubuntu.com/ubuntu/pool/universe/w/w3c-libwww/libwww0_5.4.0-9ubuntu0.4.10_amd64.deb
Size/MD5: 503738 7dffb1bfe8e5215be6840aa9a8f2d2c9

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-dev_5.4.0-9ubuntu0.4.10_i386.deb
Size/MD5: 607840 b16565a4a8dfaa8a5b10227f73d0ca5d
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-ssl-dev_5.4.0-9ubuntu0.4.10_i386.deb
Size/MD5: 614156 01705c593f044c6ef920c3799b8a7cb7
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-ssl0_5.4.0-9ubuntu0.4.10_i386.deb
Size/MD5: 452774 21fe2a50e533a6be012c07ca2e1bca33
http://security.ubuntu.com/ubuntu/pool/universe/w/w3c-libwww/libwww0_5.4.0-9ubuntu0.4.10_i386.deb
Size/MD5: 444552 098a59839be744797f2c8f9df0fc70ba

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-dev_5.4.0-9ubuntu0.4.10_powerpc.deb
Size/MD5: 694934 c4b38eaec0fbff44f0b92e6b8d4c646f
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-ssl-dev_5.4.0-9ubuntu0.4.10_powerpc.deb
Size/MD5: 704214 98db309dd1b252e6fe1fc7ec3f5e342c
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-ssl0_5.4.0-9ubuntu0.4.10_powerpc.deb
Size/MD5: 507282 96d5f4382a0df15df9a04b72f33350f5
http://security.ubuntu.com/ubuntu/pool/universe/w/w3c-libwww/libwww0_5.4.0-9ubuntu0.4.10_powerpc.deb
Size/MD5: 498518 f77c5c60228ec7f769281ca4ba690ac1

-- Ubuntu 5.04 --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/w3c-libwww_5.4.0-9ubuntu0.5.04.diff.gz
Size/MD5: 510353 dfacb49b7bc30b6829a064ed857bad36
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/w3c-libwww_5.4.0-9ubuntu0.5.04.dsc
Size/MD5: 714 6b2128a3be183cbb204645423fa4fb22
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/w3c-libwww_5.4.0.orig.tar.gz
Size/MD5: 1127018 a6073cda765b7f9fa0970eb92757f6bb

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-dev_5.4.0-9ubuntu0.5.04_amd64.deb
Size/MD5: 684646 774b5e3bb24748468fb4417119648b1b
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-ssl-dev_5.4.0-9ubuntu0.5.04_amd64.deb
Size/MD5: 692468 bc282e4fc92517bea58d67f8682f4793
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-ssl0_5.4.0-9ubuntu0.5.04_amd64.deb
Size/MD5: 512176 17bce1afc105e18c7d0a87a2bd1c0e35
http://security.ubuntu.com/ubuntu/pool/universe/w/w3c-libwww/libwww0_5.4.0-9ubuntu0.5.04_amd64.deb
Size/MD5: 503836 229e14f16890a3698b7a6c0f643c3a07

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-dev_5.4.0-9ubuntu0.5.04_i386.deb
Size/MD5: 607932 f8d90cd4c1c414fd3be1445452b0f9dc
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-ssl-dev_5.4.0-9ubuntu0.5.04_i386.deb
Size/MD5: 614278 7c49d8fb328a1615fbf68df3e31e8874
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-ssl0_5.4.0-9ubuntu0.5.04_i386.deb
Size/MD5: 452130 8869e99df88b832629d392fb09bd4943
http://security.ubuntu.com/ubuntu/pool/universe/w/w3c-libwww/libwww0_5.4.0-9ubuntu0.5.04_i386.deb
Size/MD5: 443922 8fe4ee3f786484817a18269ff5b1bb00

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-dev_5.4.0-9ubuntu0.5.04_powerpc.deb
Size/MD5: 694902 9adb92ce0d06b187804ea4ef3b9b98e0
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-ssl-dev_5.4.0-9ubuntu0.5.04_powerpc.deb
Size/MD5: 704190 4ede635cd936116304be4938db47c206
http://security.ubuntu.com/ubuntu/pool/main/w/w3c-libwww/libwww-ssl0_5.4.0-9ubuntu0.5.04_powerpc.deb
Size/MD5: 507868 cd6be292a8642f6ba829f20c0d477dcd
http://security.ubuntu.com/ubuntu/pool/universe/w/w3c-libwww/libwww0_5.4.0-9ubuntu0.5.04_powerpc.deb
Size/MD5: 498974 d12c45e22e60c084bfe6245884a3c911

ORIGINAL ADVISORY:
http://www.ubuntulinux.org/usn/usn-220-1

OTHER REFERENCES:
SA17119:
http://secunia.com/advisories/17119/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close