1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
5 |
Gentoo Linux Security Advisory GLSA 200409-01 |
6 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
7 |
http://security.gentoo.org/ |
8 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
9 |
|
10 |
Severity: High |
11 |
Title: vpopmail: Multiple vulnerabilities |
12 |
Date: September 01, 2004 |
13 |
Bugs: #60844 |
14 |
ID: 200409-01 |
15 |
|
16 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
17 |
|
18 |
Synopsis |
19 |
======== |
20 |
|
21 |
vpopmail contains several bugs making it vulnerable to several SQL |
22 |
injection exploits as well as one buffer overflow and one format |
23 |
string exploit when using Sybase. This could lead to the execution of |
24 |
arbitrary code. |
25 |
|
26 |
Background |
27 |
========== |
28 |
|
29 |
vpopmail handles virtual mail domains for qmail and Postfix. |
30 |
|
31 |
Affected packages |
32 |
================= |
33 |
|
34 |
------------------------------------------------------------------- |
35 |
Package / Vulnerable / Unaffected |
36 |
------------------------------------------------------------------- |
37 |
1 net-mail/vpopmail < 5.4.6 >= 5.4.6 |
38 |
|
39 |
Description |
40 |
=========== |
41 |
|
42 |
vpopmail is vulnerable to several unspecified SQL injection exploits. |
43 |
Furthermore when using Sybase as the backend database vpopmail is |
44 |
vulnerable to a buffer overflow and format string exploit. |
45 |
|
46 |
Impact |
47 |
====== |
48 |
|
49 |
These vulnerabilities could allow an attacker to execute code with the |
50 |
permissions of the user running vpopmail. |
51 |
|
52 |
Workaround |
53 |
========== |
54 |
|
55 |
There is no known workaround at this time. All users are encouraged to |
56 |
upgrade to the latest available version of vpopmail. |
57 |
|
58 |
Resolution |
59 |
========== |
60 |
|
61 |
All vpopmail users should upgrade to the latest version: |
62 |
|
63 |
# emerge sync |
64 |
|
65 |
# emerge -pv ">=net-mail/vpopmail-5.4.6" |
66 |
# emerge ">=net-mail/vpopmail-5.4.6" |
67 |
|
68 |
References |
69 |
========== |
70 |
|
71 |
[ 1 ] vpopmail Announcement |
72 |
http://sourceforge.net/forum/forum.php?forum_id=400873 |
73 |
[ 2 ] Bugtraq Announcement |
74 |
http://www.securityfocus.com/archive/1/371913/2004-08-15/2004-08-21/0 |
75 |
|
76 |
Availability |
77 |
============ |
78 |
|
79 |
This GLSA and any updates to it are available for viewing at |
80 |
the Gentoo Security Website: |
81 |
|
82 |
http://security.gentoo.org/glsa/glsa-200409-01.xml |
83 |
|
84 |
Concerns? |
85 |
========= |
86 |
|
87 |
Security is a primary focus of Gentoo Linux and ensuring the |
88 |
confidentiality and security of our users machines is of utmost |
89 |
importance to us. Any security concerns should be addressed to |
90 |
security@g.o or alternatively, you may file a bug at |
91 |
http://bugs.gentoo.org. |
92 |
|
93 |
License |
94 |
======= |
95 |
|
96 |
Copyright 2004 Gentoo Foundation, Inc; referenced text |
97 |
belongs to its owner(s). |
98 |
|
99 |
The contents of this document are licensed under the |
100 |
Creative Commons - Attribution / Share Alike license. |
101 |
|
102 |
http://creativecommons.org/licenses/by-sa/1.0 |
103 |
-----BEGIN PGP SIGNATURE----- |
104 |
Version: GnuPG v1.2.4 (GNU/Linux) |
105 |
|
106 |
iD8DBQFBNesqzKC5hMHO6rkRAqQfAJ98vXJREfSCaCFHxtAjEvA/nqDnggCdGQYG |
107 |
lNlmib+Hgv6NJWW2iDyufKs= |
108 |
=3l6Q |
109 |
-----END PGP SIGNATURE----- |