SuSE: 2004-015: cvs Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: cvs
Announcement-ID: SuSE-SA:2004:015
Date: Wed Jun 9 15:00:00 MEST 2004
Affected products: 8.0, 8.1, 8.2, 9.0, 9.1
SuSE Firewall on CD 2 - VPN
SuSE Firewall on CD 2
SuSE Linux Enterprise Server 7, 8
SuSE Linux Office Server
UnitedLinux 1.0
Vulnerability Type: remote command execution
Severity (1-10): 6
SUSE default package: No.
Cross References: CAN-2004-0416
CAN-2004-0417
CAN-2004-0418
Content of this advisory:
1) security vulnerability resolved: various security issues in cvs
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- icecast
- sitecopy
- cadaver
- tla
- OpenOffice_org
- tripwire
- postgresql
- lha
- apache/mod_ssl
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The Concurrent Versions System (CVS) offers tools which allow developers to share and maintain large software projects.
Various remotely exploitable conditions have been found during a
source code review of CVS done by Stefan Esser and Sebastian Krahmer
(SuSE Security-Team).
These bugs allow remote attackers to execute arbitrary code as the user
the CVS server runs as. Since there is no easy workaround we strongly
recommend to update the cvs package.
The update packages fix vulnerabilities which have been assigned the
CAN numbers CAN-2004-0416, CAN-2004-0417 and CAN-2004-0418.
The cvs packages shipped by SUSE (as well as our recent updates for CVS)
are not vulnerable to CAN-2004-0414.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
Intel i386 Platform:
SuSE-9.1:
47731cff36f671c97e90a8b304dfa508
patch rpm(s):
d9aaad71404029c53d3972f035f58b41
source rpm(s):
f3fdcd3355df637c34d1c2058be48fba
SuSE-9.0:
b2c14b51a074fd8059af6d084d2684bd
patch rpm(s):
e22c93b42f31ac7e9319cf31a266f6c0
source rpm(s):
211950707baf445fbe87fd73b243da18
SuSE-8.2:
c9e1680bd0fa4fb5239e89747add07e9
patch rpm(s):
8cabcc36b298326e738311cad37f32dc
source rpm(s):
ebeca38a0d002044c68c20bfc051b14f
SuSE-8.1:
597bac9a562582828b1f5cadd30f004f
patch rpm(s):
fc1a12767ad7e2fbfb7294cc4112b2f7
source rpm(s):
fb51cfd019b7f84857b6c6454b21418d
SuSE-8.0:
67de2e7aed4d0cc282965118bd1afb66
patch rpm(s):
9a1a381eba6312ab168e22c7d519a93a
source rpm(s):
b10baa53b3e0e4a1d0839cb5d4696215
Opteron x86_64 Platform:
SuSE-9.1:
6aec551d7128a714e40cc30e94b8f885
patch rpm(s):
64cb1180ab428731febd8259da9cf15d
source rpm(s):
98bb92fa2691254c2928cb54a9b40767
SuSE-9.0:
c913bf7436b3e7b9ccc1dda4a4af6f41
patch rpm(s):
5bbdbaf7ea7df6d57c8c1581e2ca5d87
source rpm(s):
f2953162aa93eb55b9f4c5200bedde6d
______________________________________________________________________________
2) Pending vulnerabilities in SUSE Distributions and Workarounds:
- icecast
The icecast service is vulnerable to a remote denial-of-service
attack. Update packages will be available soon.
- sitecopy
The sitecopy package includes a vulnerable version of the
neon library (CAN-2004-0179, CAN-2004-0398). Update packages will be
available soon.
- cadaver
The cadaver package includes a vulnerable version of the
neon library (CAN-2004-0179, CAN-2004-0398). Update packages will be
available soon.
- tla
The tla package includes a vulnerable version of the
neon library (CAN-2004-0179, CAN-2004-0398). Update packages will be
available soon.
- OpenOffice_org
The OpenOffice_org package includes a vulnerable version
of the neon library (CAN-2004-0179, CAN-2004-0398). Update packages
will be available soon.
- tripwire
A format string bug in tripwire can be exploited locally
to gain root permissions. Update packages will be available soon.
- postgresql
A buffer overflow in psqlODBC could be exploited to crash the
application using it. E.g. a PHP script that uses ODBC to access a
PostgreSQL database can be utilized to crash the surrounding Apache
webserver. Other parts of PostgreSQL are not affected.
Update packages will be available soon.
- lha
Minor security fix for a buffer overflow while handling command
line options. This buffer overflow could be exploited in conjunction
with other mechanisms to gain higher privileges or access the system
remotely.
- apache/mod_ssl
A buffer overflow in a uuencode function of mod_ssl has been fixed as
well as various minor bugs (CAN-2003-0987, CAN-2003-0020, CAN-2004-0174
and CAN-2003-0993). New packages are available on our ftp servers.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References