int(618)

Vulnerability Bulletins


Vulnerabilidades de protocolo en PWLib

Vulnerability classification

Property Value
Confidence level Oficial
Impact Denegación de Servicio
Dificulty Avanzado
Required attacker level Acceso remoto sin cuenta a un servicio estandar

System information

Property Value
Affected manufacturer GNU/Linux
Affected software PWLib <1.6.0

Description

Se han descubierto varias vulnerabilidades en las versiones anteriores a la 1.6.0 de la librería PWLib. La explotación de estas vulnerabilidades podría permitir a un atacante remoto provocar una denegación de servicio mediante el envío de un paquete especialmente diseñado a la aplicación que utiliza PWLib.

Solution



Actualización de software

Linux RedHat

RedHat 9
SRPMS
ftp://updates.redhat.com/9/en/os/SRPMS/pwlib-1.4.7-4.1.src.rpm
i386
ftp://updates.redhat.com/9/en/os/i386/pwlib-1.4.7-4.1.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/pwlib-devel-1.4.7-4.1.i386.rpm

Linux Debian

Debian 3.0
Source
http://security.debian.org/pool/updates/main/p/pwlib/pwlib_1.2.5-5woody1.dsc
http://security.debian.org/pool/updates/main/p/pwlib/pwlib_1.2.5-5woody1.diff.gz
http://security.debian.org/pool/updates/main/p/pwlib/pwlib_1.2.5.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_alpha.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_alpha.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_alpha.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_alpha.deb
ARM
http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_arm.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_arm.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_arm.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_i386.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_i386.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_i386.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_ia64.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_ia64.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_ia64.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_hppa.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_hppa.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_hppa.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_m68k.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_m68k.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_m68k.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_mips.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_mips.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_mips.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_mips.deb
PowerPC
http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_powerpc.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_powerpc.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_powerpc.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_s390.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_s390.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_s390.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/p/pwlib/asnparser_1.2.5-5woody1_sparc.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-1.2.0_1.2.5-5woody1_sparc.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dbg_1.2.5-5woody1_sparc.deb
http://security.debian.org/pool/updates/main/p/pwlib/libpt-dev_1.2.5-5woody1_sparc.deb

Mandrake Linux

Mandrake Linux 9.1
x86
ftp://ftp.rediris.es/mirror/mandrake/updates/9.1/RPMS/pwlib1-1.4.7-3.1.91mdk.i586.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/9.1/RPMS/pwlib1-devel-1.4.7-3.1.91mdk.i586.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/9.1/SRPMS/pwlib-1.4.7-3.1.91mdk.src.rpm
PPC
ftp://ftp.rediris.es/mirror/mandrake/updates/ppc/9.1/RPMS/pwlib1-1.4.7-3.1.91mdk.ppc.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/ppc/9.1/RPMS/pwlib1-devel-1.4.7-3.1.91mdk.ppc.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/ppc/9.1/SRPMS/pwlib-1.4.7-3.1.91mdk.src.rpm

Mandrake Linux 9.2
x86
ftp://ftp.rediris.es/mirror/mandrake/updates/9.2/RPMS/libpwlib1-1.5.0-15.1.92mdk.i586.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/9.2/RPMS/libpwlib1-devel-1.5.0-15.1.92mdk.i586.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/9.2/SRPMS/pwlib-1.5.0-15.1.92mdk.src.rpm
AMD64
ftp://ftp.rediris.es/mirror/mandrake/updates/amd64/9.2/RPMS/lib64pwlib1-1.5.0-15.1.92mdk.amd64.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/amd64/9.2/RPMS/lib64pwlib1-devel-1.5.0-15.1.92mdk.amd64.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/amd64/9.2/SRPMS/pwlib-1.5.0-15.1.92mdk.src.rpm

Standar resources

Property Value
CVE CAN-2004-0097
BID

Other resources

RedHat Security Advisory RHSA-2004:048-03
https://rhn.redhat.com/errata/RHSA-2004-048.html

Debian Security Advisory
http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00045.html

Mandrake Security Advisory MDKSA-2004:017
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:017

Version history

Version Comments Date
1.0 Aviso emitido 2004-02-13
Ministerio de Defensa
CNI
CCN
CCN-CERT