[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030707181302.GK5797__45148.0671800256$1057698511@alcor.net>
Date: Mon, 7 Jul 2003 14:13:02 -0400
From: Matt Zimmerman <mdz@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA-342-1] New mozart packages fix unsafe mailcap configuration
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 342-1 security@...ian.org
http://www.debian.org/security/ Matt Zimmerman
July 7th, 2003 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : mozart
Vulnerability : unsafe mailcap configuration
Problem-Type : remote
Debian-specific: yes
mozart, a development platform based on the Oz language, includes MIME
configuration data which specifies that Oz applications should be
passed to the Oz interpreter for execution. This means that file
managers, web browsers, and other programs which honor the mailcap
file could automatically execute Oz programs downloaded from untrusted
sources. Thus, a malicious Oz program could execute arbitrary code
under the uid of a user running a MIME-aware client program if the
user selected a file (for example, choosing a link in a web browser).
For the stable distribution (woody) this problem has been fixed in
version 1.2.3.20011204-3woody1.
For the unstable distribution (sid) this problem has been fixed in
version 1.2.5.20030212-2.
We recommend that you update your mozart package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/m/mozart/mozart_1.2.3.20011204-3woody1.dsc
Size/MD5 checksum: 737 db77a39aa2f010ec8834a711401f362b
http://security.debian.org/pool/updates/main/m/mozart/mozart_1.2.3.20011204-3woody1.diff.gz
Size/MD5 checksum: 13985 dca9c9a8e6d7df6e8c8629f7a6c593c7
http://security.debian.org/pool/updates/main/m/mozart/mozart_1.2.3.20011204.orig.tar.gz
Size/MD5 checksum: 11750595 6dd46e253d42fb3b28f92fbe679f0cca
Architecture independent components:
http://security.debian.org/pool/updates/main/m/mozart/mozart-doc-html_1.2.3.20011204-3woody1_all.deb
Size/MD5 checksum: 3715030 a9560d20cf60681d7e886ed67fafc39c
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/m/mozart/mozart_1.2.3.20011204-3woody1_i386.deb
Size/MD5 checksum: 2603488 bf5ee9d14f658391b5b52635490b5f9b
http://security.debian.org/pool/updates/main/m/mozart/mozart-contrib_1.2.3.20011204-3woody1_i386.deb
Size/MD5 checksum: 453818 38da640e3bc647ea2118caea3be5383a
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/m/mozart/mozart_1.2.3.20011204-3woody1_m68k.deb
Size/MD5 checksum: 2693506 773a378bf0d495ff06377fa6447a5bdd
http://security.debian.org/pool/updates/main/m/mozart/mozart-contrib_1.2.3.20011204-3woody1_m68k.deb
Size/MD5 checksum: 455708 cd8bbdea2e3cb0c78a3fb536349457f3
PowerPC architecture:
http://security.debian.org/pool/updates/main/m/mozart/mozart_1.2.3.20011204-3woody1_powerpc.deb
Size/MD5 checksum: 2713842 a2fe0fbe15568cced1ab30ca3afbb5f5
http://security.debian.org/pool/updates/main/m/mozart/mozart-contrib_1.2.3.20011204-3woody1_powerpc.deb
Size/MD5 checksum: 461030 d0fb02a21bed8c59c23d1f2c4ba225e3
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/m/mozart/mozart_1.2.3.20011204-3woody1_sparc.deb
Size/MD5 checksum: 2616888 adf887815d1f6a8544ef89cce8967bb6
http://security.debian.org/pool/updates/main/m/mozart/mozart-contrib_1.2.3.20011204-3woody1_sparc.deb
Size/MD5 checksum: 452178 8767035f4d1e4df343b5b38c8b2a91e0
These files will probably be moved into the stable distribution on
its next revision.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQE/Cbf2ArxCt0PiXR4RArAIAJ49KsUNtlgceucdYee0r51L0XkpaACgqiOC
Oks9PX/6unM1/+0cEUmEfrw=
=Srm7
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists