Secunia Security Advisory - Debian has issued an update for smstools. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially to gain escalated privileges.
6974b0984d6f11771fa5861426ac339e5d7821be44fded4968285c6516d92459
TITLE:
Debian update for smstools
SECUNIA ADVISORY ID:
SA18357
VERIFY ADVISORY:
http://secunia.com/advisories/18357/
CRITICAL:
Less critical
IMPACT:
Privilege escalation, DoS
WHERE:
Local system
OPERATING SYSTEM:
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
DESCRIPTION:
Debian has issued an update for smstools. This fixes a vulnerability,
which can be exploited by malicious, local users to cause a DoS
(Denial of Service) and potentially to gain escalated privileges.
For more information:
SA18343
SOLUTION:
Apply updated packages.
http://security.debian.org/pool/updates/main/s/smstools/
-- Debian GNU/Linux 3.1 alias sarge --
Source archives:
smstools_1.14.8-1sarge0.diff.gz
Size/MD5 checksum: 5106 ef55852ce6da003ef5f45df6eed1a8c5
smstools_1.14.8-1sarge0.dsc
Size/MD5 checksum: 624 1e69b0c4a20ce7f08bce8a8b51b8504d
smstools_1.14.8.orig.tar.gz
Size/MD5 checksum: 158423 85b342e53d7fdde89ef25ad21e1c5fe0
Alpha architecture:
smstools_1.14.8-1sarge0_alpha.deb
Size/MD5 checksum: 184268 59ca41ecd61cc94de2b63c8698464732
AMD64 architecture:
smstools_1.14.8-1sarge0_amd64.deb
Size/MD5 checksum: 178130 f957b798e9de3075e013521bbf6241d6
ARM architecture:
smstools_1.14.8-1sarge0_arm.deb
Size/MD5 checksum: 173506 aa2b0df1d47ad50070aebacc266f729d
HP Precision architecture:
smstools_1.14.8-1sarge0_hppa.deb
Size/MD5 checksum: 180032 168dba93586bc10214fbb6a5914f962e
Intel IA-32 architecture:
smstools_1.14.8-1sarge0_i386.deb
Size/MD5 checksum: 166816 aee3afc84707f7190c255ed3739c2958
Intel IA-64 architecture:
smstools_1.14.8-1sarge0_ia64.deb
Size/MD5 checksum: 201440 9868ead0f8885bc3851137b23d76877d
Motorola 680x0 architecture:
smstools_1.14.8-1sarge0_m68k.deb
Size/MD5 checksum: 166452 d713ee667bee3c3186ba477f9d0f91a8
Big endian MIPS architecture:
smstools_1.14.8-1sarge0_mips.deb
Size/MD5 checksum: 182332 846d0a829680db2b3662982c9fe49d4f
Little endian MIPS architecture:
smstools_1.14.8-1sarge0_mipsel.deb
Size/MD5 checksum: 182004 db7200f1504ea22681e23e749435c22a
PowerPC architecture:
smstools_1.14.8-1sarge0_powerpc.deb
Size/MD5 checksum: 172100 183e00f44548fce56df228441593bb90
IBM S/390 architecture:
smstools_1.14.8-1sarge0_s390.deb
Size/MD5 checksum: 179978 ab77f608c71a908bc51e7781b51c416d
Sun Sparc architecture:
smstools_1.14.8-1sarge0_sparc.deb
Size/MD5 checksum: 175994 a03ff752a8910e397e73f53649c5a931
-- Debian GNU/Linux unstable alias sid --
The vulnerability will reportedly be fixed soon.
ORIGINAL ADVISORY:
http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00001.html
OTHER REFERENCES:
SA18343:
http://secunia.com/advisories/18343/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------