Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200409-01 ] vpopmail: Multiple vulnerabilities
Date: Wed, 01 Sep 2004 15:37:17
Message-Id: 200409011731.11153.jaervosz@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200409-01
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: High
11 Title: vpopmail: Multiple vulnerabilities
12 Date: September 01, 2004
13 Bugs: #60844
14 ID: 200409-01
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 vpopmail contains several bugs making it vulnerable to several SQL
22 injection exploits as well as one buffer overflow and one format
23 string exploit when using Sybase. This could lead to the execution of
24 arbitrary code.
25
26 Background
27 ==========
28
29 vpopmail handles virtual mail domains for qmail and Postfix.
30
31 Affected packages
32 =================
33
34 -------------------------------------------------------------------
35 Package / Vulnerable / Unaffected
36 -------------------------------------------------------------------
37 1 net-mail/vpopmail < 5.4.6 >= 5.4.6
38
39 Description
40 ===========
41
42 vpopmail is vulnerable to several unspecified SQL injection exploits.
43 Furthermore when using Sybase as the backend database vpopmail is
44 vulnerable to a buffer overflow and format string exploit.
45
46 Impact
47 ======
48
49 These vulnerabilities could allow an attacker to execute code with the
50 permissions of the user running vpopmail.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time. All users are encouraged to
56 upgrade to the latest available version of vpopmail.
57
58 Resolution
59 ==========
60
61 All vpopmail users should upgrade to the latest version:
62
63 # emerge sync
64
65 # emerge -pv ">=net-mail/vpopmail-5.4.6"
66 # emerge ">=net-mail/vpopmail-5.4.6"
67
68 References
69 ==========
70
71 [ 1 ] vpopmail Announcement
72 http://sourceforge.net/forum/forum.php?forum_id=400873
73 [ 2 ] Bugtraq Announcement
74 http://www.securityfocus.com/archive/1/371913/2004-08-15/2004-08-21/0
75
76 Availability
77 ============
78
79 This GLSA and any updates to it are available for viewing at
80 the Gentoo Security Website:
81
82 http://security.gentoo.org/glsa/glsa-200409-01.xml
83
84 Concerns?
85 =========
86
87 Security is a primary focus of Gentoo Linux and ensuring the
88 confidentiality and security of our users machines is of utmost
89 importance to us. Any security concerns should be addressed to
90 security@g.o or alternatively, you may file a bug at
91 http://bugs.gentoo.org.
92
93 License
94 =======
95
96 Copyright 2004 Gentoo Foundation, Inc; referenced text
97 belongs to its owner(s).
98
99 The contents of this document are licensed under the
100 Creative Commons - Attribution / Share Alike license.
101
102 http://creativecommons.org/licenses/by-sa/1.0
103 -----BEGIN PGP SIGNATURE-----
104 Version: GnuPG v1.2.4 (GNU/Linux)
105
106 iD8DBQFBNesqzKC5hMHO6rkRAqQfAJ98vXJREfSCaCFHxtAjEvA/nqDnggCdGQYG
107 lNlmib+Hgv6NJWW2iDyufKs=
108 =3l6Q
109 -----END PGP SIGNATURE-----