Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200506-02 ] Mailutils: SQL Injection
Date: Mon, 06 Jun 2005 16:19:52
Message-Id: 42A477B2.7000901@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200506-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Mailutils: SQL Injection
9 Date: June 06, 2005
10 Bugs: #94824
11 ID: 200506-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 GNU Mailutils is vulnerable to SQL command injection attacks.
19
20 Background
21 ==========
22
23 GNU Mailutils is a collection of mail-related utilities.
24
25 Affected packages
26 =================
27
28 -------------------------------------------------------------------
29 Package / Vulnerable / Unaffected
30 -------------------------------------------------------------------
31 1 net-mail/mailutils < 0.6-r1 >= 0.6-r1
32
33 Description
34 ===========
35
36 When GNU Mailutils is built with the "mysql" or "postgres" USE flag,
37 the sql_escape_string function of the authentication module fails to
38 properly escape the "\" character, rendering it vulnerable to a SQL
39 command injection.
40
41 Impact
42 ======
43
44 A malicious remote user could exploit this vulnerability to inject SQL
45 commands to the underlying database.
46
47 Workaround
48 ==========
49
50 There is no known workaround at this time.
51
52 Resolution
53 ==========
54
55 All GNU Mailutils users should upgrade to the latest available version:
56
57 # emerge --sync
58 # emerge --ask --oneshot --verbose ">=net-mail/mailutils-0.6-r1"
59
60 References
61 ==========
62
63 [ 1 ] CAN-2005-1824
64 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1824
65
66 Availability
67 ============
68
69 This GLSA and any updates to it are available for viewing at
70 the Gentoo Security Website:
71
72 http://security.gentoo.org/glsa/glsa-200506-02.xml
73
74 Concerns?
75 =========
76
77 Security is a primary focus of Gentoo Linux and ensuring the
78 confidentiality and security of our users machines is of utmost
79 importance to us. Any security concerns should be addressed to
80 security@g.o or alternatively, you may file a bug at
81 http://bugs.gentoo.org.
82
83 License
84 =======
85
86 Copyright 2005 Gentoo Foundation, Inc; referenced text
87 belongs to its owner(s).
88
89 The contents of this document are licensed under the
90 Creative Commons - Attribution / Share Alike license.
91
92 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature