[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040527003902.30245.qmail@updates.mandrakesoft.com>
From: security at linux-mandrake.com (Mandrake Linux Security Team)
Subject: MDKSA-2004:052 - Updated kolab-server package fixes world readable file vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: kolab-server
Advisory ID: MDKSA-2004:052
Date: May 26th, 2004
Affected versions: 10.0
______________________________________________________________________
Problem Description:
Luca Villani reported the disclosure of critical configuration
information within Kolab, the KDE Groupware server. The affected
versions store OpenLDAP passwords in plain text. The heart of Kolab
is an engine written in Perl that rewrites configuration for certain
applications based on templates. The build() function in the engine
left slapd.conf world-readable exhibiting the OpenLDAP root password.
_______________________________________________________________________
References:
http://www.kolab.org/pipermail/kolab-users/2004-April/000215.html
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
cc7b01619905b25dbbd3ae6c51ed05fd 10.0/RPMS/kolab-server-1.0-0.23.100mdk.i586.rpm
085c3f72bad177369279ce71e47a90c8 10.0/SRPMS/kolab-server-1.0-0.23.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
7e3bce42c30cc11a6bc71ac39296a197 amd64/10.0/RPMS/kolab-server-1.0-0.23.100mdk.amd64.rpm
085c3f72bad177369279ce71e47a90c8 amd64/10.0/SRPMS/kolab-server-1.0-0.23.100mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain
the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQFAtTimmqjQ0CJFipgRAmJdAKDPuntug8YALl4Lp71fXUGml49o4gCdF0kQ
RfcgQ81mYuP+CELzN/YC2dA=
=lnPX
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists