The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


SuSE Security Announcement: pop (SuSE-SA:2001:06)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Thu, 22 Mar 2001 21:09:01 +0100
From: Thomas Biege <thomas@SUSE.DE>
To: BUGTRAQ@SECURITYFOCUS.COM
Subject: SuSE Security Announcement: pop (SuSE-SA:2001:06)

Hi,
I resend advisory SuSE-SA:2001:06, because of a wrong signature.


-----BEGIN PGP SIGNED MESSAGE-----

___________________________________________________________________________=
___

                        SuSE Security Announcement

        Package:                pop
        Announcement-ID:        SuSE-SA:2001:06
        Date:                   Wednesday, March 21th, 2001 19.19 MEST
        Affected SuSE versions: 6.1
        Vulnerability Type:     remote command execution
        Severity (1-10):        2
        SuSE default package:   no
        Other affected systems: all system using the pop package

        Content of this advisory:
        1) security vulnerability resolved: imapd, ipop2d, ipop3d
           problem description, discussion, solution and upgrade informatio=
n
        2) pending vulnerabilities, solutions, workarounds
        3) standard appendix (further information)

___________________________________________________________________________=
___

1)  problem description, brief discussion, solution, upgrade information

    The eMail access daemons imapd(8), ipop2d(8) and ipop3d(8) of SuSE 6.1
    are vulnerable to several buffer overflows. Due to a misconfiguration
    these vulnerbilities could be triggered remotely after a user had been
    authenticated.

    Download the update package from locations desribed below and install
    the package with the command `rpm -Uhv file.rpm'. The md5sum for each
    file is in the line below. You can verify the integrity of the rpm
    files using the command
        `rpm --checksig --nogpg file.rpm',
    independently from the md5 signatures below.


    i386 Intel Platform:

    SuSE-6.1
    ftp://ftp.suse.com/pub/suse/i386/update/6.1/n1/pop-2001.3.21-0.i386.rpm
      1277deee87f3d1553ee18ae078d646aa
    source rpm:
    ftp://ftp.suse.com/pub/suse/i386/update/6.1/zq1/pop-2001.3.21-0.src.rpm
      ce326335b36e51b6a635b69fc0106911



    AXP Alpha Platform:

    SuSE-6.1
    ftp://ftp.suse.com/pub/suse/axp/update/6.1/n1/pop-2001.3.21-0.alpha.rpm
      33405d29e279795d99853a1235a821f9
    source rpm:
    ftp://ftp.suse.com/pub/suse/axp/update/6.1/zq1/pop-2001.3.21-0.src.rpm
      eecd7c9ac81397f9eb7b2bee01a0154d


___________________________________________________________________________=
___

2)  Pending vulnerabilities in SuSE Distributions and Workarounds:

    - joe (configuration file vulnerability): The problem has been reported
      on multiple security-related mailing lists. We are about to provide
      fixed packages.

    - The game spaceboom (SVGA shoot'em up) has been found vulnerable to
      multiple vulnerabilities. As a reaction to these bugs, the spaceboom
      game has been dropped from the distribution. We recommend to deinstal=
l
      the game from our 6.x and 7.x distribution by using the command
      `rpm -e space=B4, or to remove the suid bit from the file
      /usr/games/SpaceBoom/SpaceBoom using the command
      `chmod -s /usr/games/SpaceBoom/SpaceBoom=B4.
      (Note: removing the suid bit prevents the game from being used by
      non-root users and from being reinstalled after removal.)

    - We are in the process of preparing update packages for the man packag=
e
      which has been found vulnerable to a commandline format string bug.
      The man command is installed suid man on SuSE systems. When exploited=
,
      the bug can be used to install a different man binary to introduce a
      trojan into the system. As an interim workaround, we recommend to
      `chmod -s /usr/bin/man=B4 and ignore the warnings and errors when
      viewing manpages.

    - The file browser MidnightCommander (mc) is vulnerable to unwanted
      program execution. Updates are currently being built.

    - A new nkitb/nkitserv package will be availabe soon. This update adres=
ses
      bugs in timed, in.ftpd.

    - New RPMs, that fix' a vulnerbility in the eperl package for SuSE 6.1-=
7.1
      are currently being built.

___________________________________________________________________________=
___

3)  standard appendix:

    SuSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   general/linux/SuSE security discussion.
            All SuSE security announcements are sent to this list.
            To subscribe, send an email to
                <suse-security-subscribe@suse.com>.

    suse-security-announce@suse.com
        -   SuSE's announce-only mailing list.
            Only SuSE's security annoucements are sent to this list.
            To subscribe, send an email to
                <suse-security-announce-subscribe@suse.com>.

    For general information or the frequently asked questions (faq)
    send mail to:
        <suse-security-info@suse.com> or
        <suse-security-faq@suse.com> respectively.

    =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
    SuSE's security contact is <security@suse.com>.
    =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

___________________________________________________________________________=
___

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way.
    SuSE GmbH makes no warranties of any kind whatsoever with respect
    to the information contained in this security advisory.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBOrpWCXey5gA9JdPZAQEyxwf+PEmG3VQd59s4IEkNpStXAH6cRqEIAIkh
rKXcrukIiBWdj08uNLoiggEgzq7wyUKBQH3thCD3CkolpPM4ViZmiVLAr8uerTmx
fP4Vd+m47VeYzcsdhRPPASpnVzgVHyLVxCiOKOM76QK1sOHZhf2jAzQEZbl9G1Mc
Z2Jo+4tAtFUPxsp0IN9NmfDezGOLeuXH5eIyp+Sgpw1fMa6Mkpk+Eib6Dc0qnM4H
JBqj1WBw539lD2wU8n4N4mM0YdUhzCx179vVJKf9C9XLPdFHUwuyDRR75M/lOH8U
dC5eg3QVdDm4bUDxMyDbvJqfxFpzlRt6dsb/vDk7Q6Hepat3plXhdQ=3D=3D
=3DklWl
-----END PGP SIGNATURE-----

Bye,
     Thomas
--=20
  Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg
  E@mail: thomas@suse.de      Function: Security Support & Auditing
  "lynx -source http://www.suse.de/~thomas/thomas.pgp | pgp -fka"
   Key fingerprint =3D 09 48 F2 FD 81 F7 E7 98  6D C7 36 F1 96 6A 12 47

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру