[newbie] Red Hat Security Notices

1999-08-20 Thread Erik Gellatly

Question:  Can or should Mandrake 6.0 users install security patches from
Red Hat, such as the one that was released this morning?  The notice
follows:

Red Hat, Inc. Security Advisory

  Package
in.telnetd

  Synopsis
Denial of service attack in in.telnetd

  Advisory ID
RHSA-1999:029-01

  Issue Date
1999-08-19

  Updated on

  Keywords
telnet telnetd



  1. Topic:
  A denial of service attack has been fixed in in.telnetd. 

  2. Bug IDs fixed:
  4560 

  3. Relevant releases/architectures:
  Red Hat Linux 6.0, all architectures 

  4. Obsoleted by:
  None 

  5. Conflicts with:
  None 

  6. RPMs required:

  Intel:

  ftp://updates.redhat.com/6.0/i386/

  telnet-0.10-29.i386.rpm

  Alpha:

  ftp://updates.redhat.com/6.0/alpha

  telnet-0.10-29.alpha.rpm

  SPARC:

  ftp://updates.redhat.com/6.0/sparc

  telnet-0.10-29.sparc.rpm

  Source:

  ftp://updates.redhat.com/6.0/SRPMS

  telnet-0.10-29.src.rpm

  Architecture neutral:

  ftp://updates.redhat.com/6.0/noarch/

  7. Problem description:
  in.telnetd attempts to negotiate a compatible terminal type between the
local and remote host.
  By setting the TERM environment variable before connecting, a remote
user could cause the
  system telnetd to open files it should not. Depending on the TERM
setting used, this could lead
  to denial of service attacks. 

  Thanks go to Michal Zalewski and the Linux Security Audit team for
noting this vulnerability. 

  8. Solution:
  For each RPM for your particular architecture, run: 

  rpm -Uvh 

  where filename is the name of the RPM. 

  9. Verification:

   MD5 sum   Package Name

-
  4360d47490f13d60b8737d28dc88825a  i386/telnet-0.10-29.i386.rpm
  90213fcdca41a3ed12ab7d92344e7286  alpha/telnet-0.10-29.alpha.rpm
  277787dbc39dff8ea84d4b16dcb7a954  sparc/telnet-0.10-29.sparc.rpm
  269783a0754d234f7bef0f4717a8dbc2  SRPMS/telnet-0.10-29.src.rpm




   

  These packages are also PGP signed by Red Hat Inc. for security. Our key
is available at:
  http://www.redhat.com/corp/contact.html 

  You can verify each package with the following command: 

  rpm --checksig filename 

  If you only wish to verify that each package has not been corrupted or
tampered with, examine
  only the md5sum with the following command: 

  rpm --checksig --nopgp filename 

  10. References:

Erik Gellatly
Salem, Oregon



RE: [newbie] Red Hat Security Notices

1999-08-20 Thread Ken Wilson

I am not an expert but my initial thoughts would be that you might
want to get the source files rather than the RPM's.  My line on this
one is that the RedHat RPM is compiled for the i386.  I am assumming
that there would be something in the configuration setup of the
source for compiling it with i586 optimizations, thereby keeping it
in line with the current philosophy of an operating system optimized
for the i586.

Just my thoughts.  I welcome any corrections to this thinking anyone
more knowledgeable might add to this.

Also, one might want to check the Mandrake update list to see if
this has possibly been handled and is available as an i586 RPM.

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED]]On Behalf Of Erik Gellatly
 Sent: Friday, August 20, 1999 9:06 AM
 To: [EMAIL PROTECTED]
 Subject: [newbie] Red Hat Security Notices


 Question:  Can or should Mandrake 6.0 users install security patches from
 Red Hat, such as the one that was released this morning?  The notice
 follows:

 Red Hat, Inc. Security Advisory

   Package
 in.telnetd

   Synopsis
 Denial of service attack in in.telnetd

   Advisory ID
 RHSA-1999:029-01

   Issue Date
 1999-08-19

   Updated on

   Keywords
 telnet telnetd



   1. Topic:
   A denial of service attack has been fixed in in.telnetd.

   2. Bug IDs fixed:
   4560

   3. Relevant releases/architectures:
   Red Hat Linux 6.0, all architectures

   4. Obsoleted by:
   None

   5. Conflicts with:
   None

   6. RPMs required:

   Intel:

   ftp://updates.redhat.com/6.0/i386/

   telnet-0.10-29.i386.rpm

   Alpha:

   ftp://updates.redhat.com/6.0/alpha

   telnet-0.10-29.alpha.rpm

   SPARC:

   ftp://updates.redhat.com/6.0/sparc

   telnet-0.10-29.sparc.rpm

   Source:

   ftp://updates.redhat.com/6.0/SRPMS

   telnet-0.10-29.src.rpm

   Architecture neutral:

  ftp://updates.redhat.com/6.0/noarch/

  7. Problem description:
  in.telnetd attempts to negotiate a compatible terminal type between the
local and remote host.
  By setting the TERM environment variable before connecting, a remote
user could cause the
  system telnetd to open files it should not. Depending on the TERM
setting used, this could lead
  to denial of service attacks.

  Thanks go to Michal Zalewski and the Linux Security Audit team for
noting this vulnerability.

  8. Solution:
  For each RPM for your particular architecture, run:

  rpm -Uvh

  where filename is the name of the RPM.

  9. Verification:

   MD5 sum   Package Name

-
  4360d47490f13d60b8737d28dc88825a  i386/telnet-0.10-29.i386.rpm
  90213fcdca41a3ed12ab7d92344e7286  alpha/telnet-0.10-29.alpha.rpm
  277787dbc39dff8ea84d4b16dcb7a954  sparc/telnet-0.10-29.sparc.rpm
  269783a0754d234f7bef0f4717a8dbc2  SRPMS/telnet-0.10-29.src.rpm






  These packages are also PGP signed by Red Hat Inc. for security. Our key
is available at:
  http://www.redhat.com/corp/contact.html

  You can verify each package with the following command:

  rpm --checksig filename

  If you only wish to verify that each package has not been corrupted or
tampered with, examine
  only the md5sum with the following command:

  rpm --checksig --nopgp filename

  10. References:

Erik Gellatly
Salem, Oregon



Re: [newbie] Red Hat Security Notices

1999-08-20 Thread Alan Shoemaker

Erikthere's no need as that update (specifically for mdk 6.0) was on the
mirror server I use this morning, see below:

08/20/99 01:03AM 56,757 telnet-0.12-10mdk.i586.rpm
08/20/99 01:03AM 26,002 telnet-server-0.12-10mdk.i586.rpm

Just use the update icon on your KDE desktop and you'll get all the updates.

Alan

-Original Message-
From: Erik Gellatly [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Date: Friday, August 20, 1999 9:35 AM
Subject: [newbie] Red Hat Security Notices


Question:  Can or should Mandrake 6.0 users install security patches from
Red Hat, such as the one that was released this morning?  The notice
follows:

Red Hat, Inc. Security Advisory

  Package
in.telnetd

  Synopsis
Denial of service attack in in.telnetd

  Advisory ID
RHSA-1999:029-01

  Issue Date
1999-08-19

  Updated on

  Keywords
telnet telnetd



  1. Topic:
  A denial of service attack has been fixed in in.telnetd.

  2. Bug IDs fixed:
  4560

  3. Relevant releases/architectures:
  Red Hat Linux 6.0, all architectures

  4. Obsoleted by:
  None

  5. Conflicts with:
  None

  6. RPMs required:

  Intel:

  ftp://updates.redhat.com/6.0/i386/

  telnet-0.10-29.i386.rpm

  Alpha:

  ftp://updates.redhat.com/6.0/alpha

  telnet-0.10-29.alpha.rpm

  SPARC:

  ftp://updates.redhat.com/6.0/sparc

  telnet-0.10-29.sparc.rpm

  Source:

  ftp://updates.redhat.com/6.0/SRPMS

  telnet-0.10-29.src.rpm

  Architecture neutral:

  ftp://updates.redhat.com/6.0/noarch/

  7. Problem description:
  in.telnetd attempts to negotiate a compatible terminal type between the
local and remote host.
  By setting the TERM environment variable before connecting, a remote
user could cause the
  system telnetd to open files it should not. Depending on the TERM
setting used, this could lead
  to denial of service attacks.

  Thanks go to Michal Zalewski and the Linux Security Audit team for
noting this vulnerability.

  8. Solution:
  For each RPM for your particular architecture, run:

  rpm -Uvh

  where filename is the name of the RPM.

  9. Verification:

   MD5 sum   Package Name

-
  4360d47490f13d60b8737d28dc88825a  i386/telnet-0.10-29.i386.rpm
  90213fcdca41a3ed12ab7d92344e7286  alpha/telnet-0.10-29.alpha.rpm
  277787dbc39dff8ea84d4b16dcb7a954  sparc/telnet-0.10-29.sparc.rpm
  269783a0754d234f7bef0f4717a8dbc2  SRPMS/telnet-0.10-29.src.rpm






  These packages are also PGP signed by Red Hat Inc. for security. Our key
is available at:
  http://www.redhat.com/corp/contact.html

  You can verify each package with the following command:

  rpm --checksig filename

  If you only wish to verify that each package has not been corrupted or
tampered with, examine
  only the md5sum with the following command:

  rpm --checksig --nopgp filename

  10. References:

Erik Gellatly
Salem, Oregon