lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 15 Aug 2003 17:59:32 -0700
From: security@....com
To: full-disclosure@...ts.netsys.com, bugtraq@...urityfocus.com,
   announce@...ts.caldera.com, scoannmod@...itec.on.ca
Subject: UnixWare 7.1.x Open UNIX 8.0.0: exploitable buffer overrun in metamail



To: full-disclosure@...ts.netsys.com bugtraq@...urityfocus.com announce@...ts.caldera.com scoannmod@...itec.on.ca

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



______________________________________________________________________________

			SCO Security Advisory

Subject:		UnixWare 7.1.2 Open UNIX 8.0.0 UnixWare 7.1.1 UnixWare 7.1.2 : exploitable buffer overrun in metamail
Advisory number: 	CSSA-2003-SCO.15
Issue date: 		2003 August 15
Cross reference:
______________________________________________________________________________


1. Problem Description

	Metamail is a package that implements MIME. Using a
	configurable "mailcap" file, metamail determines how to
	treat blocks of electronic mail text based on the content
	as described by email headers. Some popular packages for
	handling electronic mail have hooks that allow metamail to
	be called automatically while a message is being processed.

	Many buffer overflow conditions exist in version <= 2.7.
	The lack of boundary checks could lead to execution an
	arbitrary commands if the receiver processes the messages
	using the metamail package.

	The Common Vulnerabilities and Exposures (CVE) project has 
	assigned the name CVE-1999-1263, CVE-1999-0365, and CVE-1999-0037 
	to this issue. This is a candidate for inclusion in the CVE list 
	(http://cve.mitre.org), which standardizes names for security problems.  

	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1263
	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0365
	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0037

2. Vulnerable Supported Versions

	System				Binaries
	----------------------------------------------------------------------
	Open UNIX 8.0.0 		/usr/bin/metamail	
	UnixWare 7.1.1 			/usr/bin/metamail	
	UnixWare 7.1.2			/usr/bin/metamail	
	UnixWare 7.1.3 			/usr/bin/metamail	

3. Solution

	The proper solution is to install the latest packages.


4. UnixWare 7.1.3, Open UNIX 8.0.0, UnixWare 7.1.2, UnixWare 7.1.1

	4.1 Location of Fixed Binaries

	ftp://ftp.caldera.com/pub/updates/UnixWare/CSSA-2003-SCO.15


	4.2 Verification

	MD5 (erg712265.Z) = 0c528e7fb5efe8156e6b460cebe0bbb6

	md5 is available for download from
		ftp://ftp.sco.com/pub/security/tools


	4.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following sequence:

	Download erg712265.Z to the /tmp directory

	# zcat erg712265.Z | pkgadd -d -


8. References

	Specific references for this advisory:
	sr875867, fz527543, erg712265, 
	CVE-1999-1263, CVE-1999-0365, CVE-1999-0037 

	SCO security resources:
		http://www.sco.com/support/security/index.html

	This security fix closes SCO incidents sr875867, fz527543,
	erg712265.


9. Disclaimer

	SCO is not responsible for the misuse of any of the information
	we provide on this website and/or through our security
	advisories. Our advisories are a service to our customers
	intended to promote secure installation and use of SCO
	products.


10. Acknowledgments

	The SCO group would like to thank Peter Maydell and the
	Debian Security team.

______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAj89YRAACgkQaqoBO7ipriGcLwCePPWl4nIpwmrYN9TNgaH1b+FT
Uf4An0AQoOByNvRWQU7NWlbMJfM3PUq0
=+cp3
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ