exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 17122

Secunia Security Advisory 17122
Posted Oct 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for w3c-libwww. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | d0935784e7ff0dff7e80eab904a9597f23b24493ddd1db5ddba1d2ff7730e201

Secunia Security Advisory 17122

Change Mirror Download


TITLE:
Fedora update for w3c-libwww

SECUNIA ADVISORY ID:
SA17122

VERIFY ADVISORY:
https://secunia.com/advisories/17122/

CRITICAL:
Less critical

IMPACT:
DoS

WHERE:
>From remote

OPERATING SYSTEM:
Fedora Core 3
https://secunia.com/product/4222/
Fedora Core 4
https://secunia.com/product/5251/

DESCRIPTION:
Fedora has issued an update for w3c-libwww. This fixes a
vulnerability, which potentially can be exploited by malicious people
to cause a DoS (Denial of Service).

For more information:
SA17119

SOLUTION:
Apply updated packages.

Fedora Core 3:
https://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

3eacd9ce41d9764eb03cda8198262998
SRPMS/w3c-libwww-5.4.0-10.0.FC3.1.src.rpm
a5f4fc0d2de25d1b89ce79ca481704bd
x86_64/w3c-libwww-5.4.0-10.0.FC3.1.x86_64.rpm
3ce9611318ce309f12a5c4b7901ec10a
x86_64/w3c-libwww-devel-5.4.0-10.0.FC3.1.x86_64.rpm
5d57b4e4e4bb9defa67946d560696455
x86_64/w3c-libwww-apps-5.4.0-10.0.FC3.1.x86_64.rpm
605f7f6948ea02a97b2e6966ae72af88
x86_64/debug/w3c-libwww-debuginfo-5.4.0-10.0.FC3.1.x86_64.rpm
dfdbd14a8f09d83cf4accc17b7cf5dcd
x86_64/w3c-libwww-5.4.0-10.0.FC3.1.i386.rpm
dfdbd14a8f09d83cf4accc17b7cf5dcd
i386/w3c-libwww-5.4.0-10.0.FC3.1.i386.rpm
d0497449e253d2f884fc2795fb13127e
i386/w3c-libwww-devel-5.4.0-10.0.FC3.1.i386.rpm
bc65e94645c4b9716f7f0e6648bb434e
i386/w3c-libwww-apps-5.4.0-10.0.FC3.1.i386.rpm
e588b958e79620a3321d0291b654f1b3
i386/debug/w3c-libwww-debuginfo-5.4.0-10.0.FC3.1.i386.rpm

Fedora Core 4:
https://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/

262c0d05cabd1d2c9287ef95cfb6bbeb
SRPMS/w3c-libwww-5.4.0-13.0.FC4.1.src.rpm
f3c183f8df10263b4f48f28d1e4d0ef8
ppc/w3c-libwww-5.4.0-13.0.FC4.1.ppc.rpm
ba16e6511941fe94412b72a67db6b5a8
ppc/w3c-libwww-devel-5.4.0-13.0.FC4.1.ppc.rpm
c7b8dbbd35713ff49386b3a07214e242
ppc/w3c-libwww-apps-5.4.0-13.0.FC4.1.ppc.rpm
74c70aa629902b372a9bbbe0f31e184f
ppc/debug/w3c-libwww-debuginfo-5.4.0-13.0.FC4.1.ppc.rpm
59f9822598e2de59adda0d1478b3aa09
ppc/w3c-libwww-5.4.0-13.0.FC4.1.ppc64.rpm
0d057899d34c9c6d6c664c206719d1ed
x86_64/w3c-libwww-5.4.0-13.0.FC4.1.x86_64.rpm
9e0c7bff81deba4654cac3c4a7b11a05
x86_64/w3c-libwww-devel-5.4.0-13.0.FC4.1.x86_64.rpm
aab20a9b7cb6197e546cf3ea8c1ad4bb
x86_64/w3c-libwww-apps-5.4.0-13.0.FC4.1.x86_64.rpm
e61340883a3445983b2fc168c269fa33
x86_64/debug/w3c-libwww-debuginfo-5.4.0-13.0.FC4.1.x86_64.rpm
f63c23021f1e9c047ed9b5b22d782c3b
x86_64/w3c-libwww-5.4.0-13.0.FC4.1.i386.rpm
f63c23021f1e9c047ed9b5b22d782c3b
i386/w3c-libwww-5.4.0-13.0.FC4.1.i386.rpm
067487352f16347413becdc4e0090bd3
i386/w3c-libwww-devel-5.4.0-13.0.FC4.1.i386.rpm
d7189ef6a77103724d7a8f67fe9eab81
i386/w3c-libwww-apps-5.4.0-13.0.FC4.1.i386.rpm
f5a34912b15d4aae5da716aad8289df0
i386/debug/w3c-libwww-debuginfo-5.4.0-13.0.FC4.1.i386.rpm

ORIGINAL ADVISORY:
https://www.redhat.com/archives/fedora-announce-list/2005-October/msg00025.html
https://www.redhat.com/archives/fedora-announce-list/2005-October/msg00024.html

OTHER REFERENCES:
SA17119:
https://secunia.com/advisories/17119/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
https://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close