1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - -------------------------------------------------------------------- |
5 |
GENTOO LINUX SECURITY ANNOUNCEMENT |
6 |
- - -------------------------------------------------------------------- |
7 |
|
8 |
PACKAGE :mpack |
9 |
SUMMARY :remote buffer overflow |
10 |
DATE :2002-08-02 12:15 UTC |
11 |
|
12 |
- - -------------------------------------------------------------------- |
13 |
|
14 |
OVERVIEW |
15 |
|
16 |
A buffer overflow in the munpack program causes the program to crash |
17 |
and might also be used to run arbitary code. |
18 |
|
19 |
There also exist a second vulnerability that affects malformed |
20 |
filenams. |
21 |
|
22 |
DETAIL |
23 |
|
24 |
- From Debian Security Advisory DSA 141-1: |
25 |
|
26 |
Eckehard Berns discovered a buffer overflow in the munpack program |
27 |
which is used for decoding (respectively) binary files in MIME |
28 |
(Multipurpose Internet Mail Extensions) format mail messages. If |
29 |
munpack is run on an appropriately malformed email (or news article) |
30 |
then it will crash, and perhaps can be made to run arbitrary code. |
31 |
|
32 |
Herbert Xu reported a second vulnerability which affected malformed |
33 |
filenames that refer to files in upper directories like "../a". The |
34 |
security impact is limited, though, because only a single leading |
35 |
"../" was accepted and only new files can be created (i.e. no files |
36 |
will be overwritten). |
37 |
|
38 |
The full Debian Security Advisory can be read at |
39 |
http://security.debian.org |
40 |
NOTE: The DSA was not uploaded at the time when this |
41 |
advisory was written. |
42 |
|
43 |
SOLUTION |
44 |
|
45 |
It is recommended that all Gentoo Linux users update their systems as |
46 |
follows. |
47 |
|
48 |
emerge rsync |
49 |
emerge mpack |
50 |
emerge clean |
51 |
|
52 |
- - -------------------------------------------------------------------- |
53 |
Daniel Ahlberg |
54 |
aliz@g.o |
55 |
- - -------------------------------------------------------------------- |
56 |
-----BEGIN PGP SIGNATURE----- |
57 |
Version: GnuPG v1.0.7 (GNU/Linux) |
58 |
|
59 |
iD8DBQE9SnaRfT7nyhUpoZMRAhRHAJ9/hc3+8OBchIpgK5nSOfsMbr5RrQCgnXJk |
60 |
gZ2zyO+j5y5kdDsPRQH1qLM= |
61 |
=h89V |
62 |
-----END PGP SIGNATURE----- |