lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1065121811.13859.10.camel@johnm.willow.local> From: johnm at gentoo.org (John Mylchreest) Subject: GLSA: vpopmail (200310-01) GENTOO LINUX SECURITY ANNOUNCEMENT --------------------------------------------------------------------- PACKAGE : vpopmail SUMMARY : Insecure file permissions. DATE : 2003-10-02 18:28 UTC EXPLOIT : local VERSIONS AFFECTED : <=5.2.1-r5 FIXED VERSION : 5.2.1-r6 GENTOO BUG # : 23502 CVE : none known at present time --------------------------------------------------------------------- DESCRIPTION: The file /etc/vpopmail.conf which is distributed by versions of vpopmail less than 5.2.1-r6 has insecure permissions when merged with USE="mysql" causing it to be world readable. This means that any local user is able to view the contents of this file. The file contains unencrypted password information used to access the MySQL database server to modify the vpopmail table information. SOLUTION: chmod 640 /etc/vpopmail.conf emerge sync emerge -u vpopmail -pv emerge -u vpopmail emerge clean -- John Mylchreest. Gentoo Linux: http://www.gentoo.org Public Key: gpg --recv-keys 0xEAB9E721 http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xEAB9E721 Key fingerprint: 0670 E5E4 F461 806B 860A 2245 A40E 72EB EAB9 E721 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: This is a digitally signed message part Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031002/577f441e/attachment.bin