Suse all including 6.3: Security hole in wvdial <= 1.4
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: wvdial <= 1.4
Date: Tue, 14 Dec 1999 22:13:51 GMT
Affected SuSE versions: all including 6.3
Vulnerability Type: possible access to dialup passwords
SuSE default package: no
Other affected systems: all unix systems using wvdial
______________________________________________________________________________
A security hole was discovered in the package mentioned above.
Please update as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.
Please note, that that we provide this information on an "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________
1. Problem Description
If someone uses the wvdial.lxdialog script to configure a ppp dialup,
the config file /var/lib/wvdial/.config is created readable for everyone.
This config file usually contains the login and password for the dialup.
However, the directory where the config file is placed is only accessable
to those in the "dialout" group.
The default wvdial config file of SuSE, which is /etc/wvdial.conf, hasn't
got this problem.
2. Impact
Local users in the "dialout" group might gain access to dialup login
information when the wvdial.lxdialog script is used.
3. Solution
Update the package from our FTP server, or run the command below:
chmod 600 /var/lib/wvdial/.config
______________________________________________________________________________
Please verify these md5 checksums of the updates before installing:
(For SuSE 6.0, please use the 6.1 updates)
eb0c8cf0bb3c2dfa56fe753679a3117d
74069a12c78f760dc48a27d7bc6222a2
ec84718a84f65b28ffdde46cef6825c0
______________________________________________________________________________
You can find updates on our ftp-Server:
for Intel processors for Alpha processors
or try the following web pages for a list of mirrors:
http://www.suse.de/ftp.html
Our webpage for patches:
http://www.suse.de/patches/index.html
Our webpage for security announcements:
http://www.suse.de/security
If you want to report vulnerabilities, please contact
security@suse.de
______________________________________________________________________________
SuSE has got two free security mailing list services to which any
interested party may subscribe:
suse-security@suse.com - moderated and for general/linux/SuSE
security discussions. All SuSE security
announcements are send to this list.
suse-security-announce@suse.com - SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent
to this list.
To subscribe to the list, send a message to:
References