The eMail access daemons impad(8), ipop2d(8) and ipop3d(8) of SuSE 6.1 are vulnerable to several buffer overflows. Due to a misconfiguration these vulnerbilities could be triggered remotely after a user had been authenticated.
|
|
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: pop
Announcement-ID: SuSE-SA:2001:06
Date: Wednesday, March 21th, 2001 19.19 MEST
Affected SuSE versions: 6.1
Vulnerability Type: remote command execution
Severity (1-10): 2
SuSE default package: no
Other affected systems: all system using the pop package
Content of this advisory:
1) security vulnerability resolved: omap, ipop2d, ipop3d
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The eMail access daemons impad(8), ipop2d(8) and ipop3d(8) of SuSE 6.1
are vulnerable to several buffer overflows. Due to a misconfiguration
these vulnerbilities could be triggered remotely after a user had been
authenticated.
Download the update package from locations desribed below and install
the package with the command `rpm -Uhv file.rpm'. The md5sum for each
file is in the line below. You can verify the integrity of the rpm
files using the command
`rpm --checksig --nogpg file.rpm',
independently from the md5 signatures below.
i386 Intel Platform:
SuSE-6.1
ftp://ftp.suse.com/pub/suse/i386/update/6.1/n1/pop-2001.3.21-0.i386.rpm
1277deee87f3d1553ee18ae078d646aa
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.1/zq1/pop-2001.3.21-0.src.rpm
ce326335b36e51b6a635b69fc0106911
AXP Alpha Platform:
SuSE-6.1
ftp://ftp.suse.com/pub/suse/axp/update/6.1/n1/pop-2001.3.21-0.alpha.rpm
33405d29e279795d99853a1235a821f9
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/6.1/zq1/pop-2001.3.21-0.src.rpm
eecd7c9ac81397f9eb7b2bee01a0154d
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- joe (configuration file vulnerability): The problem has been reported
on multiple security-related mailing lists. We are about to provide
fixed packages.
- The game spaceboom (SVGA shoot'em up) has been found vulnerable to
multiple vulnerabilities. As a reaction to these bugs, the spaceboom
game has been dropped from the distribution. We recommend to deinstall
the game from our 6.x and 7.x distribution by using the command
`rpm -e space´, or to remove the suid bit from the file
/usr/games/SpaceBoom/SpaceBoom using the command
`chmod -s /usr/games/SpaceBoom/SpaceBoom´.
(Note: removing the suid bit prevents the game from being used by
non-root users and from being reinstalled after removal.)
- We are in the process of preparing update packages for the man package
which has been found vulnerable to a commandline format string bug.
The man command is installed suid man on SuSE systems. When exploited,
the bug can be used to install a different man binary to introduce a
trojan into the system. As an interim workaround, we recommend to
`chmod -s /usr/bin/man´ and ignore the warnings and errors when
viewing manpages.
- The file browser MidnightCommander (mc) is vulnerable to unwanted
program execution. Updates are currently being built.
- A new nkitb/nkitserv package will be availabe soon. This update adresses
bugs in timed, in.ftpd (and rwhod).
- A vulnerbility, that exists in the eperl package for SuSE 6.1-7.1 are
currently being built.
______________________________________________________________________________
3) standard appendix:
SuSE runs two security mailing lists to which any interested party may
subscribe:
suse-security@suse.com
- general/linux/SuSE security discussion.
All SuSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe@suse.com>.
suse-security-announce@suse.com
- SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe@suse.com>.
For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info@suse.com> or
<suse-security-faq@suse.com> respectively.
===============================================
SuSE's security contact is <security@suse.com>.
===============================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way.
SuSE GmbH makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOronNHey5gA9JdPZAQHNtwf+JRiIV2do5UeA7+YG3hc0f+RVP3ZAHqM9
u7Pb/2oK9yb6AQrrc2PSJeY1WKMqYGDGAs1RtMuRYykgFux3vFnVsmmZ6/BUKKwz
Ziz8uMe6BwUt3BZZiYwQQTLxEPBTJXxQpY6nF4rNhzVsecUCXM6LFBggkyV9Yd05
Vk3D+bvkkLHlJss5CFG3CITxJGi54MfqIyxab0aapu+723sxRu07MLXsmi1p3lL9
HJpVDr7OM07Sc2Sla3jjq+BiZk8R9SoZUzezn8imSmzXtKpCqZdxdv322weju7Gr
LXQuC0QfnX/Du0w0Ko3ayZK0VXe+8VDdg3DA2UUZdOmBkBPTeqUDVg==
=nRUf
-----END PGP SIGNATURE-----
This archive was generated by hypermail 2.1.0
: Mon Jun 04 2001 - 18:25:16 PDT
|