SuSE 6.x: qpop vulnerability
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: pop <= 2000.3.4
Date: Thu Jun 08 09:27:54 MEST 2000
Affected SuSE versions: 6.1-6.4
Vulnerability Type: remote compromise
SuSE default package: no
Other affected systems: all unix systems using this package
______________________________________________________________________________
A security hole was discovered in the package mentioned above.
Please update it as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.
Please note that we provide this information on an "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________
1. Problem Description
The qpop 2.53 does not check the mail header for invalid input.
2. Impact
An attacker could send a mail with a malicously formated mail header
to a person, that reveives it's mail via qpop 2.53, to execute code
with the privileges of user 'mail' at the qpop server.
3. Solution
Update the package from our FTP server.
______________________________________________________________________________
Please verify these md5 checksums of the updates before installing:
(For SuSE 6.0, please use the 6.1 updates)
AXP:
875ffbab8a189ac3360ab663164fabeb /6.3/n1/pop-2000.6.7-0.alpha.rpm
a79256e0063e04172372d5bea0131404 a25cc9e62c856cd73ffe5ec87a510b8b /6.4/n1/pop-2000.6.7-0.alpha.rpm
dc7a8b68927ce5d4e292d73389f593b5 /6.4/zq1/pop-2000.6.7-0.src.rpm
i386:
e8e3d308985ec977ea5e719b32c28395 5f06d781dea6dc755b34f1079792cd94 5194b24e2e65e0134c379fec72f5a8f2 /6.3/n1/pop-2000.6.7-0.i386.rpm
8b1290376314f54274a7d78f28e128f2 /6.3/zq1/pop-2000.6.7-0.src.rpm
62ec77feca587ff202a5f8b49f854576 /6.4/n1/pop-2000.6.7-0.i386.rpm
e15efcd8c79728222628b3f2ac4cfd6a /6.4/zq1/pop-2000.6.7-0.src.rpm
PPC:
7284e772d644288e65d7ea1baa81e55e 309dc39b97a1aa0c95bbdd93d965db55 294182bbdabb63a11807387292419ac0 09bf4786a163c044d4ab3d614e9783f6
_____________________________________________________________________________
You can find updates on our ftp-Server:
for Intel processors for Alpha processors
or try the following web pages for a list of mirrors:
http://www.suse.de/ftp.html
Our webpage for patches:
http://www.suse.de/patches/index.html
Our webpage for security announcements:
http://www.suse.de/security
If you want to report vulnerabilities, please contact
security@suse.de
______________________________________________________________________________
SuSE has got two free security mailing list services to which any
interested party may subscribe:
suse-security@suse.com - moderated and for general/linux/SuSE
security discussions. All SuSE security
announcements are sent to this list.
suse-security-announce@suse.com - SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent
to this list.
To subscribe to the list, send a message to:
References