Skip to navigation

Security Advisory Updated ucd-snmp packages available

Advisory: RHSA-2001:163-23
Type: Security Advisory
Severity: N/A
Issued on: 2001-12-04
Last updated on: 2002-03-12
Affected Products: Red Hat Linux 6.2
Red Hat Linux 7.0
Red Hat Linux 7.1
Red Hat Linux 7.2
CVEs (cve.mitre.org): CVE-2002-0012
CVE-2002-0013

Details

Updated ucd-snmp packages are now available for Red Hat Linux 6.2, 7, 7.1,
and 7.2. These packages prevent possible denial of service attacks and
security breaches as discovered by the Oulu University Secure Programming Group

The Simple Network Management Protocol (SNMP) enables
monitoring and configuration of network nodes.

The Oulu University Secure Programming Group performed
a vulnerability assessment of various SNMP implementations through syntax
testing and test-suite creation.

The test-suite showed several failures in the ucd-snmp tools in version
4.2.2 and earlier. These vulnerabilities can cause denial-of-service
conditions, service interruptions, and in some cases could result in a
remote security breach.

Updated ucd-snmp packages are provided that are not susceptible to these
vulnerabilities and which pass all tests of the test-suite sucessfully.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CAN-2002-0012 and CAN-2002-0013 to these issues.

All users of ucd-snmp should upgrade to these errata packages.

For Red Hat Linux 7.2 updated packages for ethereal (a network traffic
analyser that makes use of ucd-snmp) are directly available
via this errata as well. For all previous versions of Red Hat Linux a
separate powertools errata will provide updated ethereal packages.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

For Red Hat Linux 6.2 you will need to use the following commands to
update your system using up2date:

up2date -u
up2date ucd-snmp ucd-snmp-utils
up2date ucd-snmp-devel ucd-snmp-utils

Updated packages

Red Hat Linux 6.2

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp/4.2.3-1.6.x.3/SRPMS/ucd-snmp-4.2.3-1.6.x.3.src.rpm
Missing file
    MD5: a93ef3b304dba985f37547ba46e382eb
 
Alpha:
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp/4.2.3-1.6.x.3/alpha/ucd-snmp-4.2.3-1.6.x.3.alpha.rpm
Missing file
    MD5: 92ea4db6bca56bb0ea47335f853c7ae5
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp-devel/4.2.3-1.6.x.3/alpha/ucd-snmp-devel-4.2.3-1.6.x.3.alpha.rpm
Missing file
    MD5: de05716aa97465f4ab4f53d5bd2eb8e6
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp-utils/4.2.3-1.6.x.3/alpha/ucd-snmp-utils-4.2.3-1.6.x.3.alpha.rpm
Missing file
    MD5: f0ab940c43598a1386a849a5836b8267
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp/4.2.3-1.6.x.3/i386/ucd-snmp-4.2.3-1.6.x.3.i386.rpm
Missing file
    MD5: 827d215a8cb9a66e945d143aba13be6e
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp-devel/4.2.3-1.6.x.3/i386/ucd-snmp-devel-4.2.3-1.6.x.3.i386.rpm
Missing file
    MD5: 7e509bbcbafd138fcbda00da716b0b4a
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp-utils/4.2.3-1.6.x.3/i386/ucd-snmp-utils-4.2.3-1.6.x.3.i386.rpm
Missing file
    MD5: 090fd5720da54241ac5cc3b13c728d1a
 
Sparc:
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp/4.2.3-1.6.x.3/sparc/ucd-snmp-4.2.3-1.6.x.3.sparc.rpm
Missing file
    MD5: c7a2ceca0bcbc7d9895410a1c30b68bd
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp-devel/4.2.3-1.6.x.3/sparc/ucd-snmp-devel-4.2.3-1.6.x.3.sparc.rpm
Missing file
    MD5: 6489ed206100c2f45e84803c979d7831
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp-utils/4.2.3-1.6.x.3/sparc/ucd-snmp-utils-4.2.3-1.6.x.3.sparc.rpm
Missing file
    MD5: adb73a49a76814e0a0062d54164e8864
 
Red Hat Linux 7.0

SRPMS:
ucd-snmp-4.2.3-1.7.0.3.src.rpm
File outdated by:  RHBA-2002:106
    MD5: cc8f148b8089dfe0371a4b4312b10356
 
Alpha:
ucd-snmp-4.2.3-1.7.0.3.alpha.rpm
File outdated by:  RHBA-2002:106
    MD5: b5dcd37ae2c618c0805c945ef48c8a2a
ucd-snmp-devel-4.2.3-1.7.0.3.alpha.rpm
File outdated by:  RHBA-2002:106
    MD5: b8ac7c6a82b0700c8beacc0cfd966c06
ucd-snmp-utils-4.2.3-1.7.0.3.alpha.rpm
File outdated by:  RHBA-2002:106
    MD5: 333c14a24bb2fb993bdc46948012c3fe
 
IA-32:
ucd-snmp-4.2.3-1.7.0.3.i386.rpm
File outdated by:  RHBA-2002:106
    MD5: 71bf5b3269947b022f2a3b9563abe138
ucd-snmp-devel-4.2.3-1.7.0.3.i386.rpm
File outdated by:  RHBA-2002:106
    MD5: 291e97cc40fa8de21abb9a4802bd13a4
ucd-snmp-utils-4.2.3-1.7.0.3.i386.rpm
File outdated by:  RHBA-2002:106
    MD5: 8755a960b05ba32a83c0a43f54a6b54f
 
Red Hat Linux 7.1

SRPMS:
ucd-snmp-4.2.3-1.7.1.3.src.rpm
File outdated by:  RHBA-2002:106
    MD5: a0db045a9b979b75e2330acd66f256e8
 
Alpha:
ucd-snmp-4.2.3-1.7.1.3.alpha.rpm
File outdated by:  RHBA-2002:106
    MD5: 78f8c246da84abbeacd057e5cce97d78
ucd-snmp-devel-4.2.3-1.7.1.3.alpha.rpm
File outdated by:  RHBA-2002:106
    MD5: befb3e8dc22577adc765a78bf96384be
ucd-snmp-utils-4.2.3-1.7.1.3.alpha.rpm
File outdated by:  RHBA-2002:106
    MD5: 1be70e2f146c6db34289fe84d97261f7
 
IA-32:
ucd-snmp-4.2.3-1.7.1.3.i386.rpm
File outdated by:  RHBA-2002:159
    MD5: c4fd87f32a9623e0048b26eaed096b11
ucd-snmp-devel-4.2.3-1.7.1.3.i386.rpm
File outdated by:  RHBA-2002:159
    MD5: f8fe8f621ab724e6d911cf3a9585ec0f
ucd-snmp-utils-4.2.3-1.7.1.3.i386.rpm
File outdated by:  RHBA-2002:159
    MD5: 103e0333eb4e37d977ceb61e5bf11ea2
 
IA-64:
ucd-snmp-4.2.3-1.7.1.3.ia64.rpm
File outdated by:  RHBA-2002:106
    MD5: 30a55717364c3b2bd3e4e06269719786
ucd-snmp-devel-4.2.3-1.7.1.3.ia64.rpm
File outdated by:  RHBA-2002:106
    MD5: 8185cc3c0462112519f10d9d8be1ee4c
ucd-snmp-utils-4.2.3-1.7.1.3.ia64.rpm
File outdated by:  RHBA-2002:106
    MD5: 1f525a11d11a786a5b408a782f2637ca
 
Red Hat Linux 7.2

SRPMS:
ethereal-0.8.18-10.7.2.1.src.rpm
File outdated by:  RHSA-2003:323
    MD5: 7fe150108bbef46453f67e24a6c731fa
ucd-snmp-4.2.3-1.7.2.3.src.rpm
File outdated by:  RHBA-2002:159
    MD5: 636f2553be1458d0332bbc9e7dc68300
 
IA-32:
ethereal-0.8.18-10.7.2.1.i386.rpm
File outdated by:  RHSA-2003:323
    MD5: 0e5cb05d81426fbee44e4c5fc4b2d176
ethereal-gnome-0.8.18-10.7.2.1.i386.rpm
File outdated by:  RHSA-2003:323
    MD5: bc176a2fba2fa979f2aa28a82570c6cf
ucd-snmp-4.2.3-1.7.2.3.i386.rpm
File outdated by:  RHBA-2002:159
    MD5: 0b124baa0ad9d6dfff163bedefbd2cf8
ucd-snmp-devel-4.2.3-1.7.2.3.i386.rpm
File outdated by:  RHBA-2002:159
    MD5: c2bd228d204ee3c7668209d8e26e02c1
ucd-snmp-utils-4.2.3-1.7.2.3.i386.rpm
File outdated by:  RHBA-2002:159
    MD5: 2111e9ba725167a3f6d87db056a8bda2
 
IA-64:
ethereal-0.8.18-10.7.2.1.ia64.rpm
File outdated by:  RHSA-2003:323
    MD5: 53c6a32691f1f8e544fdd0cb02f33c49
ethereal-gnome-0.8.18-10.7.2.1.ia64.rpm
File outdated by:  RHSA-2003:323
    MD5: ab92e7740c7da2ebc753413202f19847
ucd-snmp-4.2.3-1.7.2.3.ia64.rpm
File outdated by:  RHBA-2002:159
    MD5: 8709b09c525d513b5e66a22bb1843ca3
ucd-snmp-devel-4.2.3-1.7.2.3.ia64.rpm
File outdated by:  RHBA-2002:159
    MD5: ea4c89388a0259224bf00476e44df2b4
ucd-snmp-utils-4.2.3-1.7.2.3.ia64.rpm
File outdated by:  RHBA-2002:159
    MD5: 2b993706e29bb45a336945ec4a03964c
 
s390:
ftp://updates.redhat.com/rhn/repository/NULL/ethereal/0.8.18-10.7.2.1/s390/ethereal-0.8.18-10.7.2.1.s390.rpm
Missing file
    MD5: 37e6d41c288507e258216f723607fed2
ftp://updates.redhat.com/rhn/repository/NULL/ethereal-gnome/0.8.18-10.7.2.1/s390/ethereal-gnome-0.8.18-10.7.2.1.s390.rpm
Missing file
    MD5: 9b4d4d0f84dfad8d4d2f74e386eed43e
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp/4.2.3-1.7.2.3/s390/ucd-snmp-4.2.3-1.7.2.3.s390.rpm
Missing file
    MD5: 2d9b89cdabea9c787062268de8be2ccf
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp-devel/4.2.3-1.7.2.3/s390/ucd-snmp-devel-4.2.3-1.7.2.3.s390.rpm
Missing file
    MD5: e563be8eacedf69c77f139f56802cbc5
ftp://updates.redhat.com/rhn/repository/NULL/ucd-snmp-utils/4.2.3-1.7.2.3/s390/ucd-snmp-utils-4.2.3-1.7.2.3.s390.rpm
Missing file
    MD5: 35a3de98ce8b5aca649c389f4eaec157
 

References


Keywords

protos, snmp, suite, test, ucd-snmp


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/