SuSe: hypermail multiple vulnerabilities
Summary
______________________________________________________________________________
SuSE Security Announcement
Package: hypermail
Announcement-ID: SuSE-SA:2003:0012
Date: Thursday, Feb 27th 2003 18:30 MET
Affected products: 7.1, 7.2, 7.3, 8.0, 8.1
Vulnerability Type: remote system compromise
Severity (1-10): 4
SuSE default package: no
Cross References: CAN-2003-0025
Content of this advisory:
1) security vulnerability resolved: several bugs after source code
review
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- vnc
- w3m
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
Hypermail is a tool to convert a Unix mail-box file to a set of cross- referenced HTML documents.
During an internal source code review done by Thomas Biege several bugs
where found in hypermail and its tools. These bugs allow remote code
execution, local tmp race conditions, denial-of-service conditions and
read access to files belonging to the host hypermail is running on.
Additionally the mail CGI program can be abused by spammers as email-
relay and should thus be disabled.
There is no temporary fix known other then disabling hypermail. Please
download and install the new packages from our FTP servers.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
Intel i386 Platform:
SuSE-8.1:
a4b683703b65cb65d0d1b246c2bf652d
patch rpm(s):
9e087a97c250c8987dda03da43e0dd1e
source rpm(s):
9d95d9872a3ed98a4dbff25e952335d7
SuSE-8.0:
53bdfc3ca1ab0c504f460ac7a18ba42e
source rpm(s):
be0df42b666fc59e38babd671479d2f1
SuSE-7.3:
81194dcbb3cf149f67eac9948dd79db9
source rpm(s):
9a02ce79e81bab281c418070fa91dbde
SuSE-7.2:
d61f52df6c995b65e16a4141b1b7efa1
source rpm(s):
66b65eed8f2daefde8115abf77511bba
SuSE-7.1:
698338c7d9b8961ec3d4f4ab99ee2436
source rpm(s):
8db31cd4981ee84a0333ec8200443bef
Sparc Platform:
SuSE-7.3:
341757885457f2e4b018dbb132f1a8f8
source rpm(s):
cdc92a18900996524768914c79bf20d9
AXP Alpha Platform:
SuSE-7.1:
980f217c12affcb3c0a6d0fd916a5115
source rpm(s):
a2242ecc8ba2a13c3d18ca94e6ba23f0
PPC Power PC Platform:
SuSE-7.3:
6c7a197fe18a95b7594b2cd7b572837a
source rpm(s):
e370de5432545f06731c9f841bc84054
SuSE-7.1:
64b3be05678f4789985824e31f8335d2
source rpm(s):
4cd2b65522738594d0b60333f807b8b2
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- vnc
VNC (Virtual Network Computing) uses a weak cookie generation process
which can be exploited by an attacker to bypass authentication.
New packages are currently being tested and will be available on our
FTP servers soon.
- w3m
The textbased web-browser w3m does not properly escape HTML tags.
A malicious HTML page or img alt attribute may lead to information
leakage. New packages will be available soon.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References