[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070925215137.GR22678@outflux.net>
Date: Tue, 25 Sep 2007 14:51:37 -0700
From: Kees Cook <kees@...ntu.com>
To: ubuntu-security-announce@...ts.ubuntu.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: [USN-519-1] elinks vulnerability
===========================================================
Ubuntu Security Notice USN-519-1 September 25, 2007
elinks vulnerability
CVE-2007-5034
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
elinks 0.10.6-1ubuntu3.2
Ubuntu 6.10:
elinks 0.11.1-1ubuntu2.2
Ubuntu 7.04:
elinks 0.11.1-1.2ubuntu2.2
In general, a standard system upgrade is sufficient to affect the
necessary changes.
Details follow:
Kalle Olavi Niemitalo discovered that if elinks makes a POST request
to an HTTPS URL through a proxy, information may be sent in clear-text
between elinks and the proxy. Attackers with access to the network
could steal sensitive information (such as passwords).
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2.diff.gz
Size/MD5: 31374 745db778d8da48d5bd8fd62313c299d9
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2.dsc
Size/MD5: 738 c0ea523a913d279a70c8a74ae91710be
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6.orig.tar.gz
Size/MD5: 3651428 0243203b9e54cf0cf002fca31244ce79
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_amd64.deb
Size/MD5: 906814 2923d69aaad9fdf510f0778938a52890
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_amd64.deb
Size/MD5: 732418 08d581518d511b015357b636b4b4bec2
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_i386.deb
Size/MD5: 845344 b17b1d3b39e18b37244fa9803d727e28
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_i386.deb
Size/MD5: 682980 7c5d2abc9e6be4a33d751cbeea3eacac
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_powerpc.deb
Size/MD5: 889800 008c03be901b15f7245786b29c835712
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_powerpc.deb
Size/MD5: 720926 d035afed6c4fefd680961719da376c66
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_sparc.deb
Size/MD5: 862606 47b706af007c5e742d292975d2976d40
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_sparc.deb
Size/MD5: 697554 6a69e45f969f2f9322c2e120b024cc59
Updated packages for Ubuntu 6.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2.diff.gz
Size/MD5: 30804 7375454f7de82c81875704c8ace8fbfa
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2.dsc
Size/MD5: 747 ac4ab40f6c646071391977da8803c6a3
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1.orig.tar.gz
Size/MD5: 3863617 dce0fa7cb2b6e7194ddd00e34825218b
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_amd64.deb
Size/MD5: 663838 f01381b5e0c58a16def5bbe48400033d
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_amd64.deb
Size/MD5: 460418 374d2e22edbaa346dec5f20d8959fbe3
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_i386.deb
Size/MD5: 621490 8b7c70e58374453a00d9be6985287f6b
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_i386.deb
Size/MD5: 418576 c46df44d6a25bd29f9e1030ac1736fc5
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_powerpc.deb
Size/MD5: 656474 6a91b696b81c1498201610c53e475488
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_powerpc.deb
Size/MD5: 453276 5490e3dccea1d7e4e9217b060eafdac7
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_sparc.deb
Size/MD5: 623180 88567da087d6bafc207e1c2ae36f00f9
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_sparc.deb
Size/MD5: 420738 a93466a63b8738442b9b7b8a8956d172
Updated packages for Ubuntu 7.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2.diff.gz
Size/MD5: 30996 47f76e223281a4766374ad9bfd28b2b4
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2.dsc
Size/MD5: 835 04e6aa0377c01a16a342b0515f4ed67d
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1.orig.tar.gz
Size/MD5: 3863617 dce0fa7cb2b6e7194ddd00e34825218b
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_amd64.deb
Size/MD5: 667320 1ac7f9264a8116cfa941714ef2883baf
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_amd64.deb
Size/MD5: 469024 4a9ed475d63bb65ff94b1e2e6cf4f22b
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_i386.deb
Size/MD5: 625670 73987ab1453f8064741a48c1b1c29c3e
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_i386.deb
Size/MD5: 425266 61137c1a5ed972040f2ce3866dbc4960
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_powerpc.deb
Size/MD5: 665316 9322259cb40f15081498b34af26ccae4
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_powerpc.deb
Size/MD5: 463014 b743d08aae093f63c2181f702a5ec810
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_sparc.deb
Size/MD5: 631170 b163c245dadaadc10352694f741fe0d9
http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_sparc.deb
Size/MD5: 430040 ff48526da8dd46fd2e3c012756fa52de
Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists