LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: New fetchmail packages fix potential information leak Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 900-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
November 18th, 2005                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : fetchmail
Vulnerability  : programming error
Problem type   : local
Debian-specific: no
CVE ID         : CVE-2005-3088
Debian Bug     : 336096

Thomas Wolff discovered that the fetchmailconfig program which is
provided as part of fetchmail, an SSL enabled POP3, APOP, IMAP mail
gatherer/forwarder, creates the new configuration in an insecure
fashion that can lead to leaking passwords for mail accounts to local
users.

This update also fixes a regression in the package for stable caused
by the last security update.

For the old stable distribution (woody) this problem has been fixed in
version 5.9.11-6.3.

For the stable distribution (sarge) this problem has been fixed in
version 6.2.5-12sarge3.

For the unstable distribution (sid) this problem has been fixed in
version 6.2.5.4-1.

We recommend that you upgrade your fetchmail package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3.dsc
      Size/MD5 checksum:      712 a0202bbfb89a964b38465ab99dac26ed
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3.diff.gz
      Size/MD5 checksum:   300489 a43d4b0751865e409d127f6569d78524
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11.orig.tar.gz
      Size/MD5 checksum:   950273 fff00cbf7be1d01a17605fee23ac96dd

  Architecture independent components:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail-common_5.9.11-6.3_all.deb
      Size/MD5 checksum:   165446 303e0f26a717123abc01d437b4cf1974
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmailconf_5.9.11-6.3_all.deb
      Size/MD5 checksum:    92808 e0a1f45234ad0b383dae4247022ff6ba

  Alpha architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_alpha.deb
      Size/MD5 checksum:   307102 8d4c758ec374023ec8f140f3b2eef52d

  ARM architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_arm.deb
      Size/MD5 checksum:   290750 e41f41c442f557d0aa2e38cb40a7efeb

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_i386.deb
      Size/MD5 checksum:   286466 c5dff26534fdc8c64a79192221885788

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_ia64.deb
      Size/MD5 checksum:   329958 8f1065e6d3cf76ba2f79b09ac07bdd0e

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_hppa.deb
      Size/MD5 checksum:   299072 24ed41433f2a9ef4892bf824b1993c3e

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_m68k.deb
      Size/MD5 checksum:   281252 a43b569cba25dcac5dbcdb536c3aefd7

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_mips.deb
      Size/MD5 checksum:   296526 3af7a165324f15a03d7692ccaef40afb

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_mipsel.deb
      Size/MD5 checksum:   296000 76f6728f33f773675d82b13d633eaab2

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_powerpc.deb
      Size/MD5 checksum:   291508 0220931bcbacb71e6fa7e779c8ef4e47

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_s390.deb
      Size/MD5 checksum:   288954 4489b6d67616d3a3f7a3e32d0cc37f69

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_5.9.11-6.3_sparc.deb
      Size/MD5 checksum:   293570 292404ed1be18eba63d9405e71381701


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3.dsc
      Size/MD5 checksum:      650 6dd801f3e8877367a3000f1facc0126d
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3.diff.gz
      Size/MD5 checksum:   150051 4d0139fa9e5454ab9fdc6f1eb48283e0
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5.orig.tar.gz
      Size/MD5 checksum:  1257376 9956b30139edaa4f5f77c4d0dbd80225

  Architecture independent components:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail-ssl_6.2.5-12sarge3_all.deb
      Size/MD5 checksum:    42164 3fbfce00d6a72c377a86e0cb95824705
    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmailconf_6.2.5-12sarge3_all.deb
      Size/MD5 checksum:   101250 04f2e561760abcd1c66aeec0c0b117f6

  Alpha architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_alpha.deb
      Size/MD5 checksum:   572866 f4e4242c913c81d52bf9a42e66159506

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_amd64.deb
      Size/MD5 checksum:   555584 314cbb3efc21c4470c854a7399fd1155

  ARM architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_arm.deb
      Size/MD5 checksum:   549084 56ea374911ac1d67350f2a0d1e8ac70f

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_i386.deb
      Size/MD5 checksum:   547594 593b3e0674a1cdc1c21a408182f0bcb2

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_ia64.deb
      Size/MD5 checksum:   596932 91869ec27cc91940fb2894424cd10826

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_hppa.deb
      Size/MD5 checksum:   561514 4f99dcd9b420193560c634538e84bd42

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_m68k.deb
      Size/MD5 checksum:   537822 89797886e97b38be63f159e70160573b

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_mips.deb
      Size/MD5 checksum:   556576 5a7959621e3316944a7990bad898c6e4

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_mipsel.deb
      Size/MD5 checksum:   556324 8ec394bd9a4fcb73b6a416f0f15a5aad

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_powerpc.deb
      Size/MD5 checksum:   556144 6437a64037de6c104f815db8a2e3de82

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_s390.deb
      Size/MD5 checksum:   554390 0aa60368270eef9d254fb6a24bda535e

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge3_sparc.deb
      Size/MD5 checksum:   549088 4420c57d6f0489df813bf72459e45e5e


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.