- --------------------------------------------------------------------------
Debian Security Advisory DSA 342-1                     security@debian.org 
Debian -- Security Information                              Matt Zimmerman
July 7th, 2003                           Debian -- Debian security FAQ 
- --------------------------------------------------------------------------

Package        : mozart
Vulnerability  : unsafe mailcap configuration
Problem-Type   : remote
Debian-specific: yes

mozart, a development platform based on the Oz language, includes MIME
configuration data which specifies that Oz applications should be
passed to the Oz interpreter for execution.  This means that file
managers, web browsers, and other programs which honor the mailcap
file could automatically execute Oz programs downloaded from untrusted
sources.  Thus, a malicious Oz program could execute arbitrary code
under the uid of a user running a MIME-aware client program if the
user selected a file (for example, choosing a link in a web browser).

For the stable distribution (woody) this problem has been fixed in
version 1.2.3.20011204-3woody1.

For the unstable distribution (sid) this problem has been fixed in
version 1.2.5.20030212-2.

We recommend that you update your mozart package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

      
      Size/MD5 checksum:      737 db77a39aa2f010ec8834a711401f362b
      
      Size/MD5 checksum:    13985 dca9c9a8e6d7df6e8c8629f7a6c593c7
      
      Size/MD5 checksum: 11750595 6dd46e253d42fb3b28f92fbe679f0cca

  Architecture independent components:

      
      Size/MD5 checksum:  3715030 a9560d20cf60681d7e886ed67fafc39c

  Intel IA-32 architecture:

      
      Size/MD5 checksum:  2603488 bf5ee9d14f658391b5b52635490b5f9b
      
      Size/MD5 checksum:   453818 38da640e3bc647ea2118caea3be5383a

  Motorola 680x0 architecture:

      
      Size/MD5 checksum:  2693506 773a378bf0d495ff06377fa6447a5bdd
      
      Size/MD5 checksum:   455708 cd8bbdea2e3cb0c78a3fb536349457f3

  PowerPC architecture:

      
      Size/MD5 checksum:  2713842 a2fe0fbe15568cced1ab30ca3afbb5f5
      
      Size/MD5 checksum:   461030 d0fb02a21bed8c59c23d1f2c4ba225e3

  Sun Sparc architecture:

      
      Size/MD5 checksum:  2616888 adf887815d1f6a8544ef89cce8967bb6
      
      Size/MD5 checksum:   452178 8767035f4d1e4df343b5b38c8b2a91e0

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb  Debian -- Security Information  stable/updates main
For dpkg-ftp:    dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and  http://packages.debian.org/

Debian: mozart unsafe mailcap configuration

July 7, 2003
A malicious Oz program could execute arbitrary codeunder the uid of a user running a MIME-aware client program if theuser selected a file .

Summary

mozart, a development platform based on the Oz language, includes MIME
configuration data which specifies that Oz applications should be
passed to the Oz interpreter for execution. This means that file
managers, web browsers, and other programs which honor the mailcap
file could automatically execute Oz programs downloaded from untrusted
sources. Thus, a malicious Oz program could execute arbitrary code
under the uid of a user running a MIME-aware client program if the
user selected a file (for example, choosing a link in a web browser).

For the stable distribution (woody) this problem has been fixed in
version 1.2.3.20011204-3woody1.

For the unstable distribution (sid) this problem has been fixed in
version 1.2.5.20030212-2.

We recommend that you update your mozart package.

Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody

Source archives:


Size/MD5 checksum: 737 db77a39aa2f010ec8834a711401f362b

Size/MD5 checksum: 13985 dca9c9a8e6d7df6e8c8629f7a6c593c7

Size/MD5 checksum: 11750595 6dd46e253d42fb3b28f92fbe679f0cca

Architecture independent components:


Size/MD5 checksum: 3715030 a9560d20cf60681d7e886ed67fafc39c

Intel IA-32 architecture:


Size/MD5 checksum: 2603488 bf5ee9d14f658391b5b52635490b5f9b

Size/MD5 checksum: 453818 38da640e3bc647ea2118caea3be5383a

Motorola 680x0 architecture:


Size/MD5 checksum: 2693506 773a378bf0d495ff06377fa6447a5bdd

Size/MD5 checksum: 455708 cd8bbdea2e3cb0c78a3fb536349457f3

PowerPC architecture:


Size/MD5 checksum: 2713842 a2fe0fbe15568cced1ab30ca3afbb5f5

Size/MD5 checksum: 461030 d0fb02a21bed8c59c23d1f2c4ba225e3

Sun Sparc architecture:


Size/MD5 checksum: 2616888 adf887815d1f6a8544ef89cce8967bb6

Size/MD5 checksum: 452178 8767035f4d1e4df343b5b38c8b2a91e0

These files will probably be moved into the stable distribution on
its next revision.

For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/



Severity
Package : mozart
Vulnerability : unsafe mailcap configuration
Problem-Type : remote
Debian-specific: yes

Related News