---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated mc package resolves security vulnerabilities
Advisory ID:       RHSA-2004:464-01
Issue date:        2004-09-15
Updated on:        2004-09-15
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2004-0494
---------------------------------------------------------------------

1. Summary:

An updated mc package that resolves several shell escape security issues is
now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux WS version 2.1 - i386

3. Problem description:

Midnight Commander (mc) is a visual shell much like a file manager.

Shell escape bugs have been discovered in several of the mc vfs backend
scripts. An attacker who is able to influence a victim to open a
specially-crafted URI using mc could execute arbitrary commands as the
victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0494 to this issue.

Users of mc should upgrade to this updated package which contains
backported patches and is not vulnerable to this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

     http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed  (http://bugzilla.redhat.com/ for more info):

127974 - CAN-2004-0494 extfs vfs vulnerability in mc

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS: 

afec2c565d6a6ddef751653eebaa3ad6  mc-4.5.51-36.4.src.rpm

i386:
10f69a32fd981ffcb2c018e070ca9b62  mc-4.5.51-36.4.i386.rpm

ia64:
662118226d4084bbe6e67f19f7918af1  mc-4.5.51-36.4.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS: 

afec2c565d6a6ddef751653eebaa3ad6  mc-4.5.51-36.4.src.rpm

ia64:
662118226d4084bbe6e67f19f7918af1  mc-4.5.51-36.4.ia64.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS: 

afec2c565d6a6ddef751653eebaa3ad6  mc-4.5.51-36.4.src.rpm

i386:
10f69a32fd981ffcb2c018e070ca9b62  mc-4.5.51-36.4.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
 

7. References:
 
CVE -CVE-2004-0494

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at  

Copyright 2004 Red Hat, Inc.

Red Hat: mc security vulnerabilities

An updated mc package that resolves several shell escape security issues isnow available.

Summary



Summary

Midnight Commander (mc) is a visual shell much like a file manager.Shell escape bugs have been discovered in several of the mc vfs backendscripts. An attacker who is able to influence a victim to open aspecially-crafted URI using mc could execute arbitrary commands as thevictim. The Common Vulnerabilities and Exposures project (cve.mitre.org) hasassigned the name CAN-2004-0494 to this issue.Users of mc should upgrade to this updated package which containsbackported patches and is not vulnerable to this issue.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
127974 - CAN-2004-0494 extfs vfs vulnerability in mc
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
afec2c565d6a6ddef751653eebaa3ad6 mc-4.5.51-36.4.src.rpm
i386: 10f69a32fd981ffcb2c018e070ca9b62 mc-4.5.51-36.4.i386.rpm
ia64: 662118226d4084bbe6e67f19f7918af1 mc-4.5.51-36.4.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
afec2c565d6a6ddef751653eebaa3ad6 mc-4.5.51-36.4.src.rpm
ia64: 662118226d4084bbe6e67f19f7918af1 mc-4.5.51-36.4.ia64.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
afec2c565d6a6ddef751653eebaa3ad6 mc-4.5.51-36.4.src.rpm
i386: 10f69a32fd981ffcb2c018e070ca9b62 mc-4.5.51-36.4.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from

References

Package List


Severity
Advisory ID: RHSA-2004:464-01
Issued Date: : 2004-09-15
Updated on: 2004-09-15
Product: Red Hat Enterprise Linux
CVE Names: CAN-2004-0494

Topic

An updated mc package that resolves several shell escape security issues isnow available.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64

Red Hat Linux Advanced Workstation 2.1 - ia64

Red Hat Enterprise Linux WS version 2.1 - i386


Bugs Fixed


Related News