lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <m1Ed15t-000ohWC__49596.3725880303$1132340919$gmane$org@finlandia.Infodrom.North.DE>
Date: Fri, 18 Nov 2005 08:55:37 +0100 (CET)
From: joey@...odrom.org (Martin Schulze)
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 900-1] New fetchmail packages fix potential information leak


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 900-1                     security@...ian.org
http://www.debian.org/security/                             Martin Schulze
November 18th, 2005                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : fetchmail
Vulnerability  : programming error
Problem type   : local
Debian-specific: no
CVE ID         : CVE-2005-3088
Debian Bug     : 336096

Thomas Wolff discovered that the fetchmailconfig program which is
provided as part of fetchmail, an SSL enabled POP3, APOP, IMAP mail
gatherer/forwarder, creates the new configuration in an insecure
fashion that can lead to leaking passwords for mail accounts to local
users.

This update also fixes a regression in the package for stable caused
by the last security update.

For the old stable distribution (woody) this problem has been fixed in
version 5.9.11-6.3.

For the stable distribution (sarge) this problem has been fixed in
version 6.2.5-12sarge3.

For the unstable distribution (sid) this problem has been fixed in
version 6.2.5.4-1.

We recommend that you upgrade your fetchmail package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3.dsc
      Size/MD5 checksum:      712 a0202bbfb89a964b38465ab99dac26ed
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3.diff.gz
      Size/MD5 checksum:   300489 a43d4b0751865e409d127f6569d78524
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11.orig.tar.gz
      Size/MD5 checksum:   950273 fff00cbf7be1d01a17605fee23ac96dd

  Architecture independent components:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail-common_5.9.11-6.3_all.deb
      Size/MD5 checksum:   165446 303e0f26a717123abc01d437b4cf1974
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmailconf_5.9.11-6.3_all.deb
      Size/MD5 checksum:    92808 e0a1f45234ad0b383dae4247022ff6ba

  Alpha architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_alpha.deb
      Size/MD5 checksum:   307102 8d4c758ec374023ec8f140f3b2eef52d

  ARM architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_arm.deb
      Size/MD5 checksum:   290750 e41f41c442f557d0aa2e38cb40a7efeb

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_i386.deb
      Size/MD5 checksum:   286466 c5dff26534fdc8c64a79192221885788

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_ia64.deb
      Size/MD5 checksum:   329958 8f1065e6d3cf76ba2f79b09ac07bdd0e

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_hppa.deb
      Size/MD5 checksum:   299072 24ed41433f2a9ef4892bf824b1993c3e

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_m68k.deb
      Size/MD5 checksum:   281252 a43b569cba25dcac5dbcdb536c3aefd7

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_mips.deb
      Size/MD5 checksum:   296526 3af7a165324f15a03d7692ccaef40afb

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_mipsel.deb
      Size/MD5 checksum:   296000 76f6728f33f773675d82b13d633eaab2

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_powerpc.deb
      Size/MD5 checksum:   291508 0220931bcbacb71e6fa7e779c8ef4e47

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_s390.deb
      Size/MD5 checksum:   288954 4489b6d67616d3a3f7a3e32d0cc37f69

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_sparc.deb
      Size/MD5 checksum:   293570 292404ed1be18eba63d9405e71381701


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3.dsc
      Size/MD5 checksum:      650 6dd801f3e8877367a3000f1facc0126d
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3.diff.gz
      Size/MD5 checksum:   150051 4d0139fa9e5454ab9fdc6f1eb48283e0
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5.orig.tar.gz
      Size/MD5 checksum:  1257376 9956b30139edaa4f5f77c4d0dbd80225

  Architecture independent components:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail-ssl_6.2.5-12sarge3_all.deb
      Size/MD5 checksum:    42164 3fbfce00d6a72c377a86e0cb95824705
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmailconf_6.2.5-12sarge3_all.deb
      Size/MD5 checksum:   101250 04f2e561760abcd1c66aeec0c0b117f6

  Alpha architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_alpha.deb
      Size/MD5 checksum:   572866 f4e4242c913c81d52bf9a42e66159506

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_amd64.deb
      Size/MD5 checksum:   555584 314cbb3efc21c4470c854a7399fd1155

  ARM architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_arm.deb
      Size/MD5 checksum:   549084 56ea374911ac1d67350f2a0d1e8ac70f

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_i386.deb
      Size/MD5 checksum:   547594 593b3e0674a1cdc1c21a408182f0bcb2

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_ia64.deb
      Size/MD5 checksum:   596932 91869ec27cc91940fb2894424cd10826

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_hppa.deb
      Size/MD5 checksum:   561514 4f99dcd9b420193560c634538e84bd42

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_m68k.deb
      Size/MD5 checksum:   537822 89797886e97b38be63f159e70160573b

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_mips.deb
      Size/MD5 checksum:   556576 5a7959621e3316944a7990bad898c6e4

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_mipsel.deb
      Size/MD5 checksum:   556324 8ec394bd9a4fcb73b6a416f0f15a5aad

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_powerpc.deb
      Size/MD5 checksum:   556144 6437a64037de6c104f815db8a2e3de82

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_s390.deb
      Size/MD5 checksum:   554390 0aa60368270eef9d254fb6a24bda535e

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_sparc.deb
      Size/MD5 checksum:   549088 4420c57d6f0489df813bf72459e45e5e


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDfYj5W5ql+IAeqTIRAgd9AKChPUCW7viEQ8S2oKtjZ8FJsH+iDACcCuJq
OSQ+r87pirdKIO/HM36zlRI=
=lCPL
-----END PGP SIGNATURE-----



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ