Home / vulnerabilities MDKSA-2007-042.txt
Posted on 14 February 2007
Source : packetstormsecurity.org Link
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2007:042
http://www.mandriva.com/security/
_______________________________________________________________________
Package : smb4k
Date : February 12, 2007
Affected: 2007.0
_______________________________________________________________________
Problem Description:
Kees Cook performed an audit on the Smb4K program and discovered a
number of vulnerabilities and security weaknesses that have been
addressed and corrected in Smb4K 0.8.0 which is being provided with
this update.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0473
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0474
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0475
https://lists.berlios.de/pipermail/smb4k-announce/2006-December/000037.html
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.0:
b2cd743c9cfbe504e8c2a6814d2b8a52 2007.0/i586/libsmb4k0-0.8.0-1.1mdv2007.0.i586.rpm
b129dc1aa5e906e984c46e1a0863a0a6 2007.0/i586/libsmb4k0-devel-0.8.0-1.1mdv2007.0.i586.rpm
6e64f5017bb92379ffc90b4b77bad357 2007.0/i586/smb4k-0.8.0-1.1mdv2007.0.i586.rpm
35a1749a46125e8b1ccfc7e729f9ae03 2007.0/SRPMS/smb4k-0.8.0-1.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
b7085b96bfaa3dc14ad7b9274bad2166 2007.0/x86_64/lib64smb4k0-0.8.0-1.1mdv2007.0.x86_64.rpm
ae3fcd1dc5cc1a3a70d4ccb30ae6d025 2007.0/x86_64/lib64smb4k0-devel-0.8.0-1.1mdv2007.0.x86_64.rpm
d8d64749ed12c54c9ca9fd6090f0a292 2007.0/x86_64/smb4k-0.8.0-1.1mdv2007.0.x86_64.rpm
35a1749a46125e8b1ccfc7e729f9ae03 2007.0/SRPMS/smb4k-0.8.0-1.1mdv2007.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFF0OjtmqjQ0CJFipgRAr2gAKC+e36eagqu7oyW3v4LxqtAwqd+AQCfb8pQ
+3pTzn0E4huwiC7ShDkR2wI=
=/mw7
-----END PGP SIGNATURE-----