lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1065121811.13859.10.camel@johnm.willow.local>
Date: Thu, 02 Oct 2003 20:10:11 +0100
From: John Mylchreest <johnm@...too.org>
To: security@...too.org, gentoo-announce@...too.org, bugtraq@...urityfocus.com,
   full-disclosure@...ts.netsys.com
Subject: GLSA: vpopmail (200310-01)

GENTOO LINUX SECURITY ANNOUNCEMENT
---------------------------------------------------------------------
          PACKAGE : vpopmail
          SUMMARY : Insecure file permissions.
             DATE : 2003-10-02 18:28 UTC
          EXPLOIT : local
VERSIONS AFFECTED : <=5.2.1-r5
    FIXED VERSION : 5.2.1-r6
     GENTOO BUG # : 23502
              CVE : none known at present time
---------------------------------------------------------------------

DESCRIPTION:
The file /etc/vpopmail.conf which is distributed by versions of
vpopmail less than 5.2.1-r6 has insecure permissions when merged
with USE="mysql" causing it to be world readable.

This means that any local user is able to view the contents of this
file. The file contains unencrypted password information used to
access the MySQL database server to modify the vpopmail table 
information.

SOLUTION:
chmod 640 /etc/vpopmail.conf

emerge sync
emerge -u vpopmail -pv
emerge -u vpopmail
emerge clean

-- 

John Mylchreest.

Gentoo Linux:	 http://www.gentoo.org
Public Key:	 gpg --recv-keys 0xEAB9E721
		 http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xEAB9E721

Key fingerprint: 0670 E5E4 F461 806B 860A  2245 A40E 72EB EAB9 E721

Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ