-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- --- english/security/2002/dsa-136.wml 2004-09-03 20:15:32.0 +0600
+++ russian/security/2002/dsa-136.wml 2016-09-22 22:51:06.795311269 +0500
@@ -1,32 +1,33 @@
- -multiple remote exploits
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+многоÑиÑленнÑе ÑдалÑннÑе
ÑÑзвимоÑÑи
- -The OpenSSL development team has announced that a security audit by A.L.
- -Digital Ltd and The Bunker, under the DARPA CHATS program, has revealed
- -remotely exploitable buffer overflow conditions in the OpenSSL code.
- -Additionally, the ASN1 parser in OpenSSL has a potential DoS attack
- -independently discovered by Adi Stav and James Yonan.
- -
- -CAN-2002-0655 references overflows in buffers used to hold ASCII
- -representations of integers on 64 bit platforms. CAN-2002-0656
- -references buffer overflows in the SSL2 server implementation (by
- -sending an invalid key to the server) and the SSL3 client implementation
- -(by sending a large session id to the client). The SSL2 issue was also
- -noticed by Neohapsis, who have privately demonstrated exploit code for
- -this issue. CAN-2002-0659 references the ASN1 parser DoS issue.
+Ðоманда ÑазÑабоÑки OpenSSL ÑообÑила, ÑÑо
аÑÐ´Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи, пÑоводимÑй
ÑоÑÑÑдниками A.L.
+Digital Ltd и The Bunker, по пÑогÑамме DARPA CHATS,
позволил обнаÑÑжиÑÑ
+пеÑÐµÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð±ÑÑеÑа в коде OpenSSL, коÑоÑÑе
могÑÑ Ð¸ÑполÑзоваÑÑÑÑ ÑдалÑнно.
+ÐÑоме Ñого, коде Ð´Ð»Ñ Ð³ÑаммаÑиÑеÑкого
ÑазбоÑа ASN1 в OpenSSL поÑенÑиалÑно ÑÑзвим к
оÑÐºÐ°Ð·Ñ Ð²
+обÑлÑживании, ÑÑо незавиÑимо бÑло
обнаÑÑжено Ðди СÑавом и ÐжеймÑом Ðонаном.
+
+Ð CAN-2002-0655 ÑÐºÐ°Ð·Ð°Ð½Ñ Ð¿ÐµÑÐµÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð² бÑÑеÑаÑ
,
иÑполÑзÑемÑÑ
Ð´Ð»Ñ Ñ
ÑанениÑ
+ASCII-пÑедÑÑавлений ÑелÑÑ
ÑиÑел на 64-биÑнÑÑ
плаÑÑоÑмаÑ
. Ð CAN-2002-0656
+ÑÐºÐ°Ð·Ð°Ð½Ñ Ð¿ÐµÑÐµÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð±ÑÑеÑа в ÑеализаÑии
ÑеÑÐ²ÐµÑ SSL2 (из-за оÑпÑавки
+ÑеÑвеÑÑ Ð½ÐµÐºÐ¾ÑÑекÑного клÑÑа) а ÑеализаÑии
клиенÑа SSL3
+(из-за оÑпÑавки клиенÑÑ Ð±Ð¾Ð»ÑÑого
иденÑиÑикаÑоÑа ÑеÑÑии). ÐÑоблема Ñ SSL2 бÑла
Ñак же
+обнаÑÑжена Neohapsis, коÑоÑÑй в ÑаÑÑном
поÑÑдке пÑодемонÑÑÑиÑовал код длÑ
+иÑполÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ ÑÑой пÑоблемÑ. Ð CAN-2002-0659
Ñказана пÑоблема Ñ ÐºÐ¾Ð´Ð¾Ð¼ длÑ
гÑаммаÑиÑеÑкого ÑазбоÑа ASN1.
- -These vulnerabilities have been addressed for Debian 3.0 (woody) in
- -openssl094_0.9.4-6.woody.2, openssl095_0.9.5a-6.woody.1 and
+ÐÑи ÑÑзвимоÑÑи бÑли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² Debian 3.0
(woody) в
+openssl094_0.9.4-6.woody.2, openssl095_0.9.5a-6.woody.1 и
openssl_0.9.6c-2.woody.1.
- -These vulnerabilities are also present in Debian 2.2 (potato). Fixed
- -packages are available in openssl094_0.9.4-6.potato.2 and
+ÐÑоме Ñого, ÑÑи ÑÑзвимоÑÑи пÑиÑÑÑÑÑвÑÑÑ
в Debian 2.2 (potato). ÐоÑÑÑпнÑ
+иÑпÑавленнÑе пакеÑÑ openssl094_0.9.4-6.potato.2 и
openssl_0.9.6c-0.potato.4.
- -A worm is actively exploiting this issue on internet-attached hosts;
- -we recommend you upgrade your OpenSSL as soon as possible. Note that you
- -must restart any daemons using SSL. (E.g., ssh or ssl-enabled apache.)
- -If you are uncertain which programs are using SSL you may choose to
- -reboot to ensure that all running daemons are using the new libraries.
+ЧеÑÐ²Ñ Ð°ÐºÑивно иÑполÑзÑÐµÑ ÑÑÑ Ð¿ÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð½Ð°
подклÑÑÑннÑÑ
к ÑеÑи ÐнÑеÑÐ½ÐµÑ ÑзлаÑ
;
+ÑекомендÑеÑÑÑ ÐºÐ°Ðº можно ÑкоÑее обновиÑÑ
OpenSSL. ÐамеÑÑÑе, ÑÑо вам
+ÑледÑÐµÑ Ð¿ÐµÑезапÑÑÑиÑÑ Ð²Ñе ÑлÑжбÑ,
иÑполÑзÑÑÑие SSL. (ÐапÑимеÑ, ssh или apache Ñ
поддеÑжкой ssl.)
+ÐÑли Ð²Ñ Ð½Ðµ ÑвеÑÐµÐ½Ñ Ð² Ñом, какие пÑогÑаммÑ
иÑполÑзÑÑÑ SSL, Ð²Ñ Ð¼Ð¾Ð¶ÐµÑе
+пеÑезагÑÑзиÑÑ ÑиÑÑемÑ, в ÑÑом ÑлÑÑае вÑе
запÑÑеннÑе ÑлÑÐ¶Ð±Ñ Ð±ÑдÑÑ Ð¸ÑполÑзоваÑÑ
новÑе библиоÑеки.
- --- english/security/2002/dsa-140.wml 2002-08-16 15:56:07.0 +0600
+++ russian/security/2002/dsa-140.wml 2016-09-22 22:40:03.065168526 +0500
@@ -1,34 +1,35 @@
- -buffer overflow
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+пеÑеполнение бÑÑеÑа
- -Developers of the PNG library have fixed