Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: New mailutils packages fix arbitrary code execution Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 841-1                                        Martin Schulze
October 4th, 2005             
- --------------------------------------------------------------------------

Package        : mailutils
Vulnerability  : format string vulnerability
Problem type   : remote
Debian-specific: no
CVE ID         : CAN-2005-2878

A format string vulnerability has been discovered in GNU mailutils
which contains utilities for handling mail that allows a remote
attacker to execute arbitrary code on the IMAP server.

The old stable distribution (woody) is not affected by this problem.

For the stable distribution (sarge) this problem has been fixed in
version 0.6.1-4sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 0.6.90-3.

We recommend that you upgrade your mailutils package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:     1105 571f9dc4dd73866f6888f7ad40d445a9
      Size/MD5 checksum:    37030 cdeaf9acb33abf47aadeb899163db03c
      Size/MD5 checksum:  3053948 47ff446d55909e2777efb9e912b23de5

  Architecture independent components:
      Size/MD5 checksum:   287326 f8cc3cd1b4d753c77a49a488768fed4a

  Alpha architecture:
      Size/MD5 checksum:   606384 f54df2eb18e6b761feb6e39c5c025898
      Size/MD5 checksum:   538700 4088fade15aa91790a4eeaf968e3deb1
      Size/MD5 checksum:   171206 ad50d9f2a50366a91134e355764e8db3
      Size/MD5 checksum:    48714 cde882256182f1efc3f65ee5fb8a5a91
      Size/MD5 checksum:    87216 b73d7281c7b568e00a09e6102c2f8bcb
      Size/MD5 checksum:   840400 a3896dfc973058db179400e793584849
      Size/MD5 checksum:    66522 14ae8401d93659894b73759b1b478f8b

  AMD64 architecture:
      Size/MD5 checksum:   572810 6f359d09d1146ca5ba91342cf47e8aed
      Size/MD5 checksum:   419252 63ffc694a1ae01ce93cff42a542a23f5
      Size/MD5 checksum:   156792 cbf58f684ae6016c66732100bc59549f
      Size/MD5 checksum:    47420 7819e7f8bedf0cb6a9e736cbbad0261b
      Size/MD5 checksum:    80310 c1c891e8de7f71ea1747e7345449bccf
      Size/MD5 checksum:   747904 b8a99a4c9ba9bd23a2d81c3e8b1873a1
      Size/MD5 checksum:    63066 7fd0d97ddbdd61306a690c5f135c5eac

  ARM architecture:
      Size/MD5 checksum:   527430 4ddcccc6f44fc7df839b2c028fffe55a
      Size/MD5 checksum:   398996 041963fa2132bf8473f119b9a0c46b98
      Size/MD5 checksum:   139946 138bd36d955a0590663691da9a924e87
      Size/MD5 checksum:    45920 395f7450d6d6808d9e650dd0191bdc98
      Size/MD5 checksum:    73224 3d99823d12f33edbc4ba48a78785c065
      Size/MD5 checksum:   611910 85de420573e56df18b696f99986d2e4e
      Size/MD5 checksum:    58728 1713cfbb377dcf306f502766555e2c56

  Intel IA-32 architecture:
      Size/MD5 checksum:   546638 33c7ba82e32cb44e60ccc11c898350aa
      Size/MD5 checksum:   368170 eb33117e3ea1af53f9acb25b91d19802
      Size/MD5 checksum:   143594 e031d8e9c5e66ace4391f915d8505199
      Size/MD5 checksum:    46600 4e5ac10b6ccf7ce323d01631da6406db
      Size/MD5 checksum:    75060 080e134a5b18a50691573fcb2587ceea
      Size/MD5 checksum:   648372 0b390cfe6f739dc61b964c60b47b5f22
      Size/MD5 checksum:    60458 88304f09d9508705d6689ba581380eb6

  Intel IA-64 architecture:
      Size/MD5 checksum:   686370 4cb54d890bc50a94b4c86abdbf33eee7
      Size/MD5 checksum:   560412 9ac160e35b8af32107d58726b5b64107
      Size/MD5 checksum:   198664 ee929d5849173c9ab70928bc61e69bee
      Size/MD5 checksum:    51238 9d39ff55ab465b23b5c661b47ae9630d
      Size/MD5 checksum:    96998 54e94843d30f4eff696ebcdd45c7a539
      Size/MD5 checksum:   990306 69e8b44efc1925b8ae388b37274b7b82
      Size/MD5 checksum:    72422 245ec7e13466de3d1d43eec6abdb741e

  HP Precision architecture:
      Size/MD5 checksum:   595258 d4ca564d255bdc33d1769c1b1063fe8e
      Size/MD5 checksum:   442204 5c238fde3c655bcf043180e90f47172a
      Size/MD5 checksum:   158120 b8f5748edf06712cb7dce347f93ef407
      Size/MD5 checksum:    47578 6e041420aea5d1edd31c5a34d69bbefa
      Size/MD5 checksum:    79582 9e03d9c6cbfb8ac2381a82c9098d3117
      Size/MD5 checksum:   743390 8039702fb15714fbf208e593387772ef
      Size/MD5 checksum:    62636 1974df850795b3c8e90f711feed74353

  Motorola 680x0 architecture:
      Size/MD5 checksum:   530392 feb5047c2cb1b1aa622ce00f4fa88a8e
      Size/MD5 checksum:   342010 8be136e24deac85778b6aed825eedf4b
      Size/MD5 checksum:   137976 21192aff6dabf3ce2dd720ac621bdd79
      Size/MD5 checksum:    46002 11524c5af73a9230b396acfbc8ac70ef
      Size/MD5 checksum:    71980 b19b14b7d6fab2d65691841b237535c4
      Size/MD5 checksum:   585942 96fb6e0b0bd5c77135471137bf4e03f3
      Size/MD5 checksum:    58532 5e08996c218aed9d69df307dc5cfc25c

  Big endian MIPS architecture:
      Size/MD5 checksum:   546328 fd4c71af25939af23fef5f3264282fb2
      Size/MD5 checksum:   435486 3e0e0384e04a09384d770b1ab4baea32
      Size/MD5 checksum:   170178 91bdf8e9f748cc7d59720bde9a2902ea
      Size/MD5 checksum:    47324 92c7228dab7e3eef27830516725d92c2
      Size/MD5 checksum:    79408 9a53d5edbbde3e22891c17e46d963df4
      Size/MD5 checksum:   736470 05e81cdbde2a46b0390395673a08cc1f
      Size/MD5 checksum:    63246 23f641022bea23e89754fcfdbe6a0ee7

  Little endian MIPS architecture:
      Size/MD5 checksum:   543782 d3b0685929f7a7509593070bd6c3cb24
      Size/MD5 checksum:   435074 0b429dc39083c2f1d297fe74109d9ff1
      Size/MD5 checksum:   169236 8f8baa1b0c29f740c6df24eef4be72f4
      Size/MD5 checksum:    47348 928829f7677458a3a98a172de42845bf
      Size/MD5 checksum:    79370 af3aac9553ed1b32b5e202be0c5f25ee
      Size/MD5 checksum:   733964 4896c6d726bf6bb55ca3799bf16316b1
      Size/MD5 checksum:    63062 0b6a4acd7abdce23cc5453eb74fe0ace

  PowerPC architecture:
      Size/MD5 checksum:   562656 f67259ab832b0f8c0603cdc67dbe7da5
      Size/MD5 checksum:   413256 52af6f53afe953e2b61c6963a7767fa4
      Size/MD5 checksum:   157132 dbea4cf9d3c13eb64dbfb6c45afc4656
      Size/MD5 checksum:    48140 a17f9d5f6819a01c43203bba60bd1318
      Size/MD5 checksum:    77740 a49bb18465fd525432408f04a1a5e2eb
      Size/MD5 checksum:   703556 0313c6d7732ea9dc02fdfe761d19d285
      Size/MD5 checksum:    62720 b872dc38bd68f37eade1d93122b06d5d

  IBM S/390 architecture:
      Size/MD5 checksum:   588272 9b08cf5bf32808febe51d504f7a1de28
      Size/MD5 checksum:   414258 e4dfb8ba1d2c9ae961f4266535b1db13
      Size/MD5 checksum:   156044 e3a2c3bc8577fe048961dfafd65af520
      Size/MD5 checksum:    47764 12c866ffaf0c4bdf3e1740b3204159af
      Size/MD5 checksum:    80440 972141900eb33f9f5af71f2dbd7735af
      Size/MD5 checksum:   751338 41c5a8f2321793932ed0b656d6d2ab5d
      Size/MD5 checksum:    63234 c7c4a9cddd4883057bf48259fc48da4d

  Sun Sparc architecture:
      Size/MD5 checksum:   538590 c087d0acbb5aaa85a2a604d502405ef2
      Size/MD5 checksum:   377926 afe33096c3f86adb272ead55253ee886
      Size/MD5 checksum:   139886 9138582e6bdd999321b9073ed8164b64
      Size/MD5 checksum:    46012 d13c45d9852f0400e61ec550da0f427e
      Size/MD5 checksum:    73622 0ecb0584c1652b26373dd22c457f1a5a
      Size/MD5 checksum:   624018 ad86570361a60694083e945abd2a5ff6
      Size/MD5 checksum:    58758 b4c553eaee679c961775fcac89cbd168

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.