[Full-Disclosure] SuSE Security Announcement: pine (SuSE-SA:2002:046)

2002-11-25 Thread Thomas Biege
-BEGIN PGP SIGNED MESSAGE-

__

SuSE Security Announcement

Package:pine
Announcement-ID:SuSE-SA:2002:046
Date:   Monday, Nov 25th 2002 10:30 MEST
Affected products:  7.1, 7.2, 7.3, 8.0, 8.1
SuSE Linux Database Server
SuSE eMail Server 3.1
SuSE eMail Server III
SuSE Firewall Adminhost VPN
SuSE Linux Admin-CD for Firewall
SuSE Firewall on CD 2 - VPN
SuSE Firewall on CD 2
SuSE Linux Enterprise Server for S/390
SuSE Linux Connectivity Server
SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Office Server
Vulnerability Type: remote denial-of-service
Severity (1-10):4
SuSE default package:   yes (7.1 - 8.0)
no  (8.1)
Cross References:   none

Content of this advisory:
1) security vulnerability resolved:
 - heap buffer overflow while parsing mail address
   problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
 - sparc distribution
 - WindowMaker
3) standard appendix (further information)

__

1)  problem description, brief discussion, solution, upgrade information

Pine, Program for Internet News and Email, is a well known and widely
used eMail client.
While parsing and escaping characters of eMail addresses pine does not
allocate enough memory for storing the escaped mailbox part of an
address. This results in a buffer overflow on the heap that will make
pine crash. The offending eMail can just be deleted manually or by using
another mail user agent.

A possible temporary workaround is to filter the respective header
lines by a mail delivery agent (such as procmail).

Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command rpm -Fhv file.rpm to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.



Intel i386 Platform:

SuSE-8.1:
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/pine-4.44-224.i586.rpm
  8c32d5571d7488e31f693a884dedb81e
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/pine-4.44-224.i586.patch.rpm
  467b8b318958b0ead3f30fa7b1f5a9a0
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/pine-4.44-224.src.rpm
  9b1ff436719cf9752cda3ddd711e80a7

SuSE-8.0:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n1/pine-4.44-222.i386.rpm
  01d9e82164a5ce4037b84be1b2ed4228
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n1/pine-4.44-222.i386.patch.rpm
  162c4265909af7805f7aeaf3e12e8763
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/pine-4.44-222.src.rpm
  d724e02b1ea3783e5bfb01ae9728d7cf

SuSE-7.3:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n1/pine-4.33-266.i386.rpm
  140c58adf7d0b2113d5b20de67e2
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/pine-4.33-266.src.rpm
  100c86e88ce357b0efacf7dfe2ab592c

SuSE-7.2:
ftp://ftp.suse.com/pub/suse/i386/update/7.2/n1/pine-4.33-266.i386.rpm
  bd44232250b3def07cab81064dad11f2
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/pine-4.33-266.src.rpm
  e28daa1f2d66135fcf5951c9b2dc19be

SuSE-7.1:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/n1/pine-4.33-263.i386.rpm
  9bdd3394336a786b0711b8e98ab4a268
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/pine-4.33-263.src.rpm
  630478b751a24e86c52fe645be9365c4



Sparc Platform:

SuSE-7.3:
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n1/pine-4.33-97.sparc.rpm
  5187b311c27f043178a12ae186d228a6
source rpm(s):
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/pine-4.33-97.src.rpm
  9616303edadfd899785f3ac12d2dc02a



AXP Alpha Platform:

SuSE-7.1:
ftp://ftp.suse.com/pub/suse/axp/update/7.1/n1/pine-4.33-85.alpha.rpm
  f5155d79236e3ec15c463f586f731c17
source rpm(s):
ftp://ftp.suse.com/pub/suse/axp/update/7.1/zq1/pine-4.33-85.src.rpm
  75365b21b97c8a2f722d95491f62d305




PPC Power PC Platform:

SuSE-7.3:

Re: [Full-Disclosure] [PHC] Sermon #3 (w/ reply to Paul Schmehl others)

2002-11-25 Thread sockz loves you
- Original Message -
From: Euan Briggs [EMAIL PROTECTED]
Date: Sat, 23 Nov 2002 00:52:30 -0500 
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] [PHC] Sermon #3 (w/ reply to Paul Schmehl  others)

 Sorry to tell you this PHC, but I know who the majority of you are
 and where you originate from. 

OMG NO!!!
does this mean that my real identity as a transvestite cross-gendered ex-felon
stripper who never originated from boston but really comes from a shell that was
hatched in the ocean deep has been made public?!  oh the embarassment!!!  how 
will the hacker world ever take me seriously again!?!

mr euan briggs, PHC isn't just the #phrack@EFnet ops.  there are members of PHC
who aren't opped on #phrack, some who don't even visit the channel.  some who
dont even bother with irc like you and i do.

but seriously, i'd like to know what you know about me, and where i originate
from.  i'm comfortable with you revealing this to the list or anywhere else for
that matter.  my identity is hardly something of a secret these days, but i'm
fairly certain you remain without any clue.
 
 My work with Snosoft does not mark my entry into the field. To be
 frank, the reason I entered the whitehat arena, is because I am
 appalled at what has happened to the blackhat scene. I am appalled by
 the motives and attitudes of people such as PHC. I am appalled by the
 behaviour of people like you. I have a conscience and a sense of
 responsibility, towards my fellow human beings and our society. I
 want the world to be a better place. I don't see working for the
 security industry as some sort of betrayal of my blackhat roots, I
 see it as making a -positive- contribution to society. I see it as
 paying my debt to society, for the years I spent as a blackhat.
 Entering the industry was a natural progression. I dont get a kick
 out of crime, it only brings guilt and it is a rejection of the
 society that nurtured you,  human society which you owe your life to.

if this is the case then what have you actually done about it?  you
constantly whine and gripe about how #phrack is so bad and evil and omg stop
them!!  but so far your actions to stop #phrack have amounted to zilch, nada,
nothing.  if you are so eager to talk about how great you are and how right you
are, then why not give us some evidence as to why we should believe you.  if
you're not prepared to show evidence of malicious activities against #phrack or
anyone else then shut up about your blackhat roots and your debt to society.

i doubt you ever were a blackhat, as you have consistantly shown a lack of skill
to back up the lies you tell.
 
 You claim to hate the security industry, because you believe they
 are exploiting hackers and their world. Unless you yourselfs are
 genuinely being exploited, I would say this part of your rather
 contradictory manifesto its nothing more than a thin veneer of
 justification for your delinquent attitudes. As I said in my last
 post, I think you are just pissed off that you have a motivated and
 well funded competitor (the industry), and people like you helped
 create it.
*snip*

i cant speak for everyone who's against the security industry, just myself.
so far my ideology in this whole mess has evolved.  as i expanded my
investigation into what the problem actually is, i realised that the term
anti-security industry didn't really fit me, as i was more about changing
the current system for the better... not the worse.  like you and just about
everyone else on this list i feel a degree of social responsibility when it
comes to the matter.  but unlike yourself i am not so resistant to change, and
the cost of that change.

we're learning as we go along here, just like anyone else.  plz dont take words
that were uttered in the heat of spirited patriotism to be the basis of our
arguments.

*snap*
 You claim to be advocating non-disclosure because you believe it will
 increase security, yet at the same time you claim to be blackhat
 (implication = criminal) hackers. It doesnt add up.

*sigh*
i've tried to explain this so many times before.  yet again i attempt to 
simplify everything without making too broad an assumption... yet again do i 
explain this:

blackhat ~= person who advocates non-disclosure.  hacks computers.  doesn't brag
security ~= the likelihood of a system withstanding an attack.

at the moment many many ppl have ready access to information on how to
compromise security.  but a person can only secure their own system.  this
means that many ppl pose a security risk that few ppl can actually manage.
(strong offence versus weak defence)

non-disclosure solves this problem.

if fewer ppl know about hacks (because blackhats dont talk about them) then
fewer systems are threatened because the ratio of attackers:admins is
reduced.

PLEASE, try and think about it for yourself instead of trying to find all the
faults in what i've said.  just take a good look with an open and rational mind
and work it out for yourself, it will 

RE: [Full-Disclosure] PHC replies to criticism

2002-11-25 Thread Nuno Fernandes
Why don't you PHC freaks get a life.


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of
[EMAIL PROTECTED]
Sent: Sunday, November 24, 2002 6:16 PM
To: [EMAIL PROTECTED]
Subject: [Full-Disclosure] PHC replies to criticism


-BEGIN PGP SIGNED MESSAGE-

Hello,

In response to Len's administrivia...

We have decided to avoid self-defeating personal vendettas on this list
and
focus on those critics of PHC who possess the ability to think clearly
and make
cogent arguments. Such critics include Paul Schmehl and Steve Manzuik,
perhaps
the only critics on this list who have displayed clarity of thought and
the
ability to make logical and relevant arguments against what we have
said.

No names will be mentioned here, but we will be ignoring the following
classes
of people:

1. Those paranoid schizophrenics who make outlandish conspiracy theory
claims
suggesting that PHC is a government project or that PHC has been
influenced by
the government. We're not sure if these people are serious, but anyway.
The
meds aren't meant to taste good.

2. Those weak-minded individuals who, as we have mentioned in a previous
sermon, resort to nothing but ad hominem attacks such as lamers,
scriptkids, newbies, and so on -- attacks they can't back up with
evidence
when challenged, i.e. they ignore the challenge totally and throw out
further
unsubstantiated, vaporous drivel. This makes them look like stubborn
intellectual midgets who are capable of nothing except baseless
monologues.

3. Those people unable to focus on the points raised, but instead choose
to go
off on a tangent with their self-promotional rants about how they are
reformed
blackhats and such. The transparency of these people in their job
hunting
process is truly laughable. This is a really silly thing to note here,
but one
of these individuals who has been online since 1994 has called PHC
fresh
bloods, when in actual fact the majority of PHC has been online since
before
then, as is clearly evident to anyone who researches old ezine releases
and
knows enough about PHC to make accurate connections. As if time online
necessarily relates to skillz or other irrelevant crap, anyway.

4. People sending in narc logs that have been floating around for a
long
time, not realizing that they are actually doing us a favour in
vindicating us
of terrorism motives.

Well, OK, we will mention one name: the fake 'nwonknu' who also appears
to be
the fake 'shiftee'. Do what you may, but you are welcome to email us and
express your grievances against us. Don't read into this as a passive
assimilation tactic, though.

As an exercise to the reader, see if you can classify the expected
replies to
this post based on the classes outlined above. The person who posts the
most
accurate classification attempt will be awarded op status in #phrack
(yay).


PHC



-BEGIN PGP SIGNATURE-
Version: Hush 2.2 (Java)
Note: This signature can be verified at https://www.hushtools.com/verify

wlgEARECABgFAj3hX/QRHHBoY0BodXNobWFpbC5jb20ACgkQ0rw64nEc6GLidwCeIdQD
vrHFRPAGR199hHQGOJ6c07cAoJjD4BnslhqHtTdj7GWDykpKI70X
=ohf1
-END PGP SIGNATURE-




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



[Full-Disclosure] MDKSA-2002:081 - Updated samba packages fix potential root compromise

2002-11-25 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



Mandrake Linux Security Update Advisory


Package name:   samba
Advisory ID:MDKSA-2002:081
Date:   November 25th, 2002

Affected versions:  8.1, 8.2, 9.0


Problem Description:

 A vulnerability in samba versions 2.2.2 through 2.2.6 was discovered
 by the Debian samba maintainers.  A bug in the length checking for
 encrypted password change requests from clients could be exploited
 using a buffer overrun attack on the smbd stack.  This attack would
 have to crafted in such a way that converting a DOS codepage string to
 little endian UCS2 unicode would translate into an executable block of
 code.
 
 This vulnerability has been fixed in samba version 2.2.7, and the
 updated packages have had a patch applied to fix the problem.


References:
  
  http://www.samba.org/samba/whatsnew/samba-2.2.7.html


Updated Packages:
  
 Mandrake Linux 8.1:
 b10451e71a1ba27d45956f57fb203118  8.1/RPMS/samba-2.2.2-3.3mdk.i586.rpm
 22a6f9977518bbe2923ec7d2f68a698e  8.1/RPMS/samba-client-2.2.2-3.3mdk.i586.rpm
 74d59e5578aaa0a23e760c828a6d8688  8.1/RPMS/samba-common-2.2.2-3.3mdk.i586.rpm
 6d6a2835fd6e21b4c93dbaa5fe6f2d13  8.1/RPMS/samba-doc-2.2.2-3.3mdk.i586.rpm
 4c7511781a263f633cab5bf1831ad69b  8.1/SRPMS/samba-2.2.2-3.3mdk.src.rpm

 Mandrake Linux 8.1/IA64:
 2456e2af90d2e71e877a16f2ff034c73  ia64/8.1/RPMS/samba-2.2.2-3.3mdk.ia64.rpm
 66043b111988d82d2800763950ea07e3  ia64/8.1/RPMS/samba-client-2.2.2-3.3mdk.ia64.rpm
 6954d750eae921eece5e1e2ece9c42e5  ia64/8.1/RPMS/samba-common-2.2.2-3.3mdk.ia64.rpm
 cf5545988b8d07299b776a25d6dc2e56  ia64/8.1/RPMS/samba-doc-2.2.2-3.3mdk.ia64.rpm
 4c7511781a263f633cab5bf1831ad69b  ia64/8.1/SRPMS/samba-2.2.2-3.3mdk.src.rpm

 Mandrake Linux 8.2:
 5552fadd8509fc7222099f88dad0f5a9  8.2/RPMS/nss_wins-2.2.3a-10.1mdk.i586.rpm
 58da182a9a84a02010ddaf939e97bc7c  8.2/RPMS/samba-2.2.3a-10.1mdk.i586.rpm
 91dcff33758dca1ca9a4779186a6917d  8.2/RPMS/samba-client-2.2.3a-10.1mdk.i586.rpm
 ce98076728c73ca79b78fc9d69b94b47  8.2/RPMS/samba-common-2.2.3a-10.1mdk.i586.rpm
 983c2de083b240971026bb054b449fde  8.2/RPMS/samba-doc-2.2.3a-10.1mdk.i586.rpm
 fe4c7a8ebedede8ac10ff98eac2b84a5  8.2/RPMS/samba-swat-2.2.3a-10.1mdk.i586.rpm
 ec00eed80e135dd79b56608bbd2c0574  8.2/RPMS/samba-winbind-2.2.3a-10.1mdk.i586.rpm
 5677dee51659f50acee4e55346ca737d  8.2/SRPMS/samba-2.2.3a-10.1mdk.src.rpm

 Mandrake Linux 8.2/PPC:
 32e41a8c06f1b5b24b13de0f65dfa3cc  ppc/8.2/RPMS/nss_wins-2.2.3a-10.1mdk.ppc.rpm
 275bf7b8a2792e11bf94dc24557f8ebc  ppc/8.2/RPMS/samba-2.2.3a-10.1mdk.ppc.rpm
 66232f77afcacc83090e3cf848717962  ppc/8.2/RPMS/samba-client-2.2.3a-10.1mdk.ppc.rpm
 912ccb4cc81f89de6de871aa1c4833c0  ppc/8.2/RPMS/samba-common-2.2.3a-10.1mdk.ppc.rpm
 af73612d4ea52c4a391ca75afd0dae8b  ppc/8.2/RPMS/samba-doc-2.2.3a-10.1mdk.ppc.rpm
 2117cd7af96f6467c867faef73a425b6  ppc/8.2/RPMS/samba-swat-2.2.3a-10.1mdk.ppc.rpm
 ab0402b7173a04be1cbc6c415807b98a  ppc/8.2/RPMS/samba-winbind-2.2.3a-10.1mdk.ppc.rpm
 5677dee51659f50acee4e55346ca737d  ppc/8.2/SRPMS/samba-2.2.3a-10.1mdk.src.rpm

 Mandrake Linux 9.0:
 25b264e1b5ee43b26d861f5b5e07d7d2  9.0/RPMS/nss_wins-2.2.7-2.1mdk.i586.rpm
 619a0506a84d25099ca0653be0f5fd3a  9.0/RPMS/samba-client-2.2.7-2.1mdk.i586.rpm
 d7ed710067f71285cc616fe07efd7753  9.0/RPMS/samba-common-2.2.7-2.1mdk.i586.rpm
 2b5667097a398ef87e9e721c26bb613b  9.0/RPMS/samba-doc-2.2.7-2.1mdk.i586.rpm
 ff124b4103dd84e51f5be82dd9244b1f  9.0/RPMS/samba-server-2.2.7-2.1mdk.i586.rpm
 a7b976a81f59d7ce7111cb5f44d89bcd  9.0/RPMS/samba-swat-2.2.7-2.1mdk.i586.rpm
 0859d8665e9d2ea2f1f96365a7456e3f  9.0/RPMS/samba-winbind-2.2.7-2.1mdk.i586.rpm
 b93cd8ca9319a628ee7015bbd5d2196e  9.0/SRPMS/samba-2.2.7-2.1mdk.src.rpm


Bug IDs fixed (see https://qa.mandrakesoft.com for more information):


To upgrade automatically, use MandrakeUpdate.  The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with rpm -Fvh *.rpm.  A list of
FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:

  rpm --checksig filename

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team from:

  

[Full-Disclosure] MDKSA-2002:082 - Updated python packages fix local arbitrary code execution vulnerability

2002-11-25 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



Mandrake Linux Security Update Advisory


Package name:   python
Advisory ID:MDKSA-2002:082
Date:   November 25th, 2002

Affected versions:  7.2, 8.0, 8.1, 8.2, 9.0,
Single Network Firewall 7.2


Problem Description:

 A vulnerability was discovered in python by Zack Weinberg in the way
 that the execvpe() method from the os.py module uses a temporary file
 name.  The file is created in an unsafe manner and execvpe() tries to
 execute it, which can be used by a local attacker to execute arbitrary
 code with the privilege of the user running the python code that is
 using this method.


References:
  
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1119
  http://mail.python.org/pipermail/python-dev/2002-August/027223.html
  http://python.org/sf/590294


Updated Packages:
  
 Linux-Mandrake 7.2:
 e9e016b6b07fc58997f02b78b299f105  7.2/RPMS/python-1.5.2-12.1mdk.i586.rpm
 f08129c7b43de40eb712b0a7d4a5554e  7.2/RPMS/python-devel-1.5.2-12.1mdk.i586.rpm
 0e59d9f64e6f8be19f4e2dc73a2b2090  7.2/RPMS/python-docs-1.5.2-12.1mdk.i586.rpm
 d969562e109022071cf69515cf9146b9  7.2/RPMS/tkinter-1.5.2-12.1mdk.i586.rpm
 411eb33a72870ba125b7331ab9f077a4  7.2/SRPMS/python-1.5.2-12.1mdk.src.rpm

 Mandrake Linux 8.0:
 9e9c147b6260b731016be16837d2cd09  8.0/RPMS/python-2.0-9.1mdk.i586.rpm
 c3a0d50a5c4ef7fd374c9e7614c9a0c6  8.0/RPMS/python-devel-2.0-9.1mdk.i586.rpm
 c7c31e4986334484d470066b6c2db346  8.0/RPMS/python-docs-2.0-9.1mdk.i586.rpm
 69a2f2e7d10fb885592d7b4943dcac61  8.0/RPMS/tkinter-2.0-9.1mdk.i586.rpm
 c24d21f1d7e7e454c2ce78d2ce84a015  8.0/SRPMS/python-2.0-9.1mdk.src.rpm

 Mandrake Linux 8.0/PPC:
 8c35df120638c62d47f586d4faf702d4  ppc/8.0/RPMS/python-2.0-9.1mdk.ppc.rpm
 4d54961b8e8cdc301719f42855c6e45c  ppc/8.0/RPMS/python-devel-2.0-9.1mdk.ppc.rpm
 d9943638bf6d8ff59950faef4a832c48  ppc/8.0/RPMS/python-docs-2.0-9.1mdk.ppc.rpm
 5f57afb7e9d2042200e8ecd84e83143e  ppc/8.0/RPMS/tkinter-2.0-9.1mdk.ppc.rpm
 c24d21f1d7e7e454c2ce78d2ce84a015  ppc/8.0/SRPMS/python-2.0-9.1mdk.src.rpm

 Mandrake Linux 8.1:
 47695f02d722a8a7393af449a556fcc7  8.1/RPMS/libpython2.2-2.2-9.1mdk.i586.rpm
 3fcb8dfd92f1dfaa076a95f227fee87c  8.1/RPMS/libpython2.2-devel-2.2-9.1mdk.i586.rpm
 0f2f801268d9348f93c67a96d4d0f9d7  8.1/RPMS/python-2.2-9.1mdk.i586.rpm
 b69396894c2575949718df77d781  8.1/RPMS/python-base-2.2-9.1mdk.i586.rpm
 81ab8ba9cd85b0bea9029aac3ed0d652  8.1/RPMS/python-docs-2.2-9.1mdk.i586.rpm
 339191d1e03b5961cc625d2e4996f15f  8.1/RPMS/tkinter-2.2-9.1mdk.i586.rpm
 d1ac7fa2119ec7c84d408027d44f8525  8.1/SRPMS/python-2.2-9.1mdk.src.rpm

 Mandrake Linux 8.1/IA64:
 f27d9c351d9a74b5ea431956b33796af  ia64/8.1/RPMS/libpython2.2-2.2-9.1mdk.ia64.rpm
 ccc514a11b7906c2ca2a3d32b63cf85b  ia64/8.1/RPMS/libpython2.2-devel-2.2-9.1mdk.ia64.rpm
 b80f7653eb52b8de5bcd1eac9b39a882  ia64/8.1/RPMS/python-2.2-9.1mdk.ia64.rpm
 68e4333b0ab080c7bf441728d1f96544  ia64/8.1/RPMS/python-base-2.2-9.1mdk.ia64.rpm
 6915e488de60562b3728fe7e476fd9a8  ia64/8.1/RPMS/python-docs-2.2-9.1mdk.ia64.rpm
 d1ac7fa2119ec7c84d408027d44f8525  ia64/8.1/SRPMS/python-2.2-9.1mdk.src.rpm

 Mandrake Linux 8.2:
 22771586df09a081fdd8c00b84a01611  8.2/RPMS/libpython2.2-2.2-9.1mdk.i586.rpm
 4649b5d23aeb0a0868c21a0950ef6166  8.2/RPMS/libpython2.2-devel-2.2-9.1mdk.i586.rpm
 1aa805b1f870bcb8e042def0d1011719  8.2/RPMS/python-2.2-9.1mdk.i586.rpm
 3adaec8a682f16962ba52c984fd6270c  8.2/RPMS/python-base-2.2-9.1mdk.i586.rpm
 137abe1f02e02e89bf2b635b76d07892  8.2/RPMS/python-docs-2.2-9.1mdk.i586.rpm
 107a60f5b00f477514038459801d156d  8.2/RPMS/tkinter-2.2-9.1mdk.i586.rpm
 d1ac7fa2119ec7c84d408027d44f8525  8.2/SRPMS/python-2.2-9.1mdk.src.rpm

 Mandrake Linux 8.2/PPC:
 abb56b161b156cac0cba992e470d98a9  ppc/8.2/RPMS/libpython2.2-2.2-9.1mdk.ppc.rpm
 c8848d308e18571eb43452ad5e57907f  ppc/8.2/RPMS/libpython2.2-devel-2.2-9.1mdk.ppc.rpm
 5a065c10e341216cb02516166d12cdfa  ppc/8.2/RPMS/python-2.2-9.1mdk.ppc.rpm
 5fb31cc3f167e4f0a1e813ed535ea0a8  ppc/8.2/RPMS/python-base-2.2-9.1mdk.ppc.rpm
 f82636adec1620a226fce4781a771c08  ppc/8.2/RPMS/python-docs-2.2-9.1mdk.ppc.rpm
 fd7d4732704cc5d65d3db31aadc30679  ppc/8.2/RPMS/tkinter-2.2-9.1mdk.ppc.rpm
 d1ac7fa2119ec7c84d408027d44f8525  ppc/8.2/SRPMS/python-2.2-9.1mdk.src.rpm

 Mandrake Linux 9.0:
 68816873ca418b97541ab7b817659f6d  9.0/RPMS/libpython2.2-2.2.1-14.1mdk.i586.rpm
 b563b5a12f11f65463e21e5035b5bff6  9.0/RPMS/libpython2.2-devel-2.2.1-14.1mdk.i586.rpm
 1fd791067dd84dc2f7ed0b9d1d67348d  9.0/RPMS/python-2.2.1-14.1mdk.i586.rpm
 3e011ff7fb03797803b129341ff7f087  

[Full-Disclosure] Cisco IOS 12.2(4)XR

2002-11-25 Thread Behnam Beikzadeh
Hi,

I need to evaluate Cisco IOS X-Release 12.2(4)XR
(exactly S366CK9W5-12204XR,c3660-ik9w5-mz).

Here is the download URL

http://www.cisco.com/pcgi-bin/Software/Iosplanner/Planner-tool/iosplanner.cgi?majorRel=12.2
 

but the link seems broken and Cisco does not wish to support mentioned IOS anymore. I 
thought somebody may have kept a copy.


Thanks,
Behnam


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html