exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 30868

Secunia Security Advisory 30868
Posted Jun 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for openssl. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | 1d327a51c6eb8b4a817b11a79a5f95daf9b42f3a63127dfdab859b7a81748023

Secunia Security Advisory 30868

Change Mirror Download
----------------------------------------------------------------------

Want a new job?

http://secunia.com/secunia_security_specialist/
http://secunia.com/hardcore_disassembler_and_reverse_engineer/

International Partner Manager - Project Sales in the IT-Security
Industry:
http://corporate.secunia.com/about_secunia/64/

----------------------------------------------------------------------

TITLE:
Ubuntu update for openssl

SECUNIA ADVISORY ID:
SA30868

VERIFY ADVISORY:
http://secunia.com/advisories/30868/

CRITICAL:
Moderately critical

IMPACT:
DoS

WHERE:
>From remote

OPERATING SYSTEM:
Ubuntu Linux 8.04
http://secunia.com/product/18611/

DESCRIPTION:
Ubuntu has issued an update for openssl. This fixes some
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service).

For more information:
SA30405

SOLUTION:
Apply updated packages.

-- Ubuntu 8.04 LTS --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.3.diff.gz
Size/MD5: 52995 b1cea7b7db0cb4522acd795c3928f6d6
http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.3.dsc
Size/MD5: 912 ac4c66a0442648d7b1a1afd326609c54
http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g.orig.tar.gz
Size/MD5: 3354792 acf70a16359bf3658bdfb74bda1c4419

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.8g-4ubuntu3.3_all.deb
Size/MD5: 628742 36c2d25fdf6427526076a8d6b5da2e96

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.3_amd64.udeb
Size/MD5: 603880 84269c06376fba49d325c730777068c6
http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3.3_amd64.deb
Size/MD5: 2064718 33f436e01452fc2731b30700d3e0cb25
http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ubuntu3.3_amd64.deb
Size/MD5: 1604058 c07455422c05690cab6b54026279f9e3
http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu3.3_amd64.deb
Size/MD5: 931362 43218bfe72915fb66bdf8c081f847fcb
http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.3_amd64.deb
Size/MD5: 390580 1c33397eeeaf9c43dbadbc952effca25

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.3_i386.udeb
Size/MD5: 564676 2afdf22196bfa295f2847798c28ebc56
http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3.3_i386.deb
Size/MD5: 1941746 9e1601920ffb4579750c62e3bafcc788
http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ubuntu3.3_i386.deb
Size/MD5: 5341160 b92bf74a2f51c864239b7266dc902fd6
http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu3.3_i386.deb
Size/MD5: 2828380 bdfaf989e6b72ba194845ac03d5c27b4
http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.3_i386.deb
Size/MD5: 385396 a91bd87423e0063ab2bb18ecf44ae995

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.3_lpia.udeb
Size/MD5: 535446 5841b6cc1e0fae3393afabc957037822
http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3.3_lpia.deb
Size/MD5: 1922442 32dcdad159f05decabf11549ff204f37
http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ubuntu3.3_lpia.deb
Size/MD5: 1512426 4fb1d4039493d3f2d08dcfb27de4dc31
http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu3.3_lpia.deb
Size/MD5: 842914 7924b29683950fdde4467c65e0e1d337
http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.3_lpia.deb
Size/MD5: 390020 7a31e11f913264848caf9970c8b55859

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.3_powerpc.udeb
Size/MD5: 610278 7d857eca164bdfff475280cf334fd968
http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3.3_powerpc.deb
Size/MD5: 2077858 49b892b43342c57136963936314cd850
http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ubuntu3.3_powerpc.deb
Size/MD5: 1639382 34a79f78df92067f4be10eacbb72463d
http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu3.3_powerpc.deb
Size/MD5: 944698 1c4cae202d0012cd143bd81239b36c71
http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.3_powerpc.deb
Size/MD5: 399184 b4a0cd49967333a6e617f7ddf6be1427

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.3_sparc.udeb
Size/MD5: 559658 d065856a7822c4d5f5382b1ad1a652fe
http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3.3_sparc.deb
Size/MD5: 1984612 c82132370120b65e6e278df0755eb1a6
http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ubuntu3.3_sparc.deb
Size/MD5: 3873772 dfcf08c38728d64842da3f378639b191
http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu3.3_sparc.deb
Size/MD5: 2241472 37861360b67b2ce0b038e49ea4a6ae67
http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.3_sparc.deb
Size/MD5: 397828 ffe5e48d1e71e27bd8adf064f4adcc64

ORIGINAL ADVISORY:
https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-June/000722.html

OTHER REFERENCES:
SA30405:
http://secunia.com/advisories/30405/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close