MDKSA-2003:005 - Updated leafnode packages fix remote DoS vulnerability
by Nikola Strahija on January 15th, 2003 A vulnerability was discovered by Jan Knutar in leafnode that Mark Brown pointed out could be used in a Denial of Service attack. This vulnerability causes leafnode to go into an infinite loop with 100% CPU use when an article that has been crossposed to several groups, one of which is the prefix of another, is requested by it's Message-ID.
Package name: leafnode
Advisory ID: MDKSA-2003:005
Date: January 14th, 2003
Affected versions: 8.2, 9.0
________________________________________________________________________
Problem Description:
A vulnerability was discovered by Jan Knutar in leafnode that
Mark Brown pointed out could be used in a Denial of Service
attack. This vulnerability causes leafnode to go into an
infinite loop with 100% CPU use when an article that has been
crossposed to several groups, one of which is the prefix of
another, is requested by it's Message-ID.
This vulnerability was introduced in 1.9.20 and fixed upstream
in version 1.9.30. Only Mandrake Linux 9.0 is affected by this,
but version 1.9.19 (which shipped with Mandrake Linux 8.2) is
receiving an update due to critical bugs in it that can corrupt
parts of its news spool under certain circumstances.
________________________________________________________________________
References:
http://marc.theaimsgroup.com/?l=bugtraq&m=104127108823436&w=2
________________________________________________________________________
Updated Packages:
Mandrake Linux 8.2:
a9c3f6f4198c88e71f7c78281d6ead7b 8.2/RPMS/leafnode-1.9.31-1.1mdk.i586.rpm
25f0be374ababf45db444a9b64ab1a98 8.2/SRPMS/leafnode-1.9.31-1.1mdk.src.rpm
Mandrake Linux 8.2/PPC:
c39ab8855cbb4d0727c796242edda60c ppc/8.2/RPMS/leafnode-1.9.31-1.1mdk.ppc.rpm
25f0be374ababf45db444a9b64ab1a98 ppc/8.2/SRPMS/leafnode-1.9.31-1.1mdk.src.rpm
Mandrake Linux 9.0:
4749ee927caa55f15adddadd473a3d12 9.0/RPMS/leafnode-1.9.31-1.1mdk.i586.rpm
25f0be374ababf45db444a9b64ab1a98 9.0/SRPMS/leafnode-1.9.31-1.1mdk.src.rpm
________________________________________________________________________
Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
________________________________________________________________________
To upgrade automatically, use MandrakeUpdate. The verification of md5
checksums and GPG signatures is performed automatically for you.
If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of
FTP mirrors can be obtained from:
http://www.mandrakesecure.net/en/ftp.php
Please verify the update prior to upgrading to ensure the integrity of
the downloaded package. You can do this with the command:
rpm --checksig
All packages are signed by MandrakeSoft for security. You can obtain
the GPG public key of the Mandrake Linux Security Team from:
https://www.mandrakesecure.net/RPM-GPG-KEYS
Please be aware that sometimes it takes the mirrors a few hours to
update.
You can view other update advisories for Mandrake Linux at:
http://www.mandrakesecure.net/en/advisories/
MandrakeSoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained by
visiting:
http://www.mandrakesecure.net/en/mlist.php
If you want to report vulnerabilities, please contact
security_linux-mandrake.com