Linux Security
    Linux Security
    Linux Security

    Debian: courier arbitrary command execution vulnerability

    Date 30 Jan 2003
    Posted By LinuxSecurity Advisories
    The developers of courier, an integrated user side mail server,discovered a problem in the PostgreSQL auth module.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 247-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    January 30th, 2003             
    - --------------------------------------------------------------------------
    Package        : courier
    Vulnerability  : missing input sanitizing
    Problem-Type   : remote
    Debian-specific: no
    CVE Id         : CAN-2003-0040
    The developers of courier, an integrated user side mail server,
    discovered a problem in the PostgreSQL auth module.  Not all
    potentially malicious characters were sanitized before the username
    was passed to the PostgreSQL engine.  An attacker could inject
    arbitrary SQL commands and queries exploiting this vulnerability.  The
    MySQL auth module is not affected.
    For the stable distribution (woody) this problem has been fixed in
    version 0.37.3-3.3.
    The old stable distribution (potato) does not contain courier packages.
    For the unstable distribution (sid) this problem has been fixed in
    version 0.40.2-3.
    We recommend that you upgrade your courier-authpostgresql package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      846 06c98336ee0e40813eac24cb59574de8
          Size/MD5 checksum:    12649 bac28bb29418f9d965aedeb819876ebc
          Size/MD5 checksum:  3238268 f5f742679ac97906fc306763e08e1ed8
      Alpha architecture:
          Size/MD5 checksum:    43286 d73b6054896137f6593a4b438da54fdc
          Size/MD5 checksum:     9970 f8141363587679a4badc7c1c7e714751
          Size/MD5 checksum:     7700 6b774c8584957bee71f0cf4f66aac69a
          Size/MD5 checksum:     9748 d75800272a41656b4324131a8de3a47c
          Size/MD5 checksum:    93626 7cb6a750dfcd12d70cc792d6c0c25e44
      ARM architecture:
          Size/MD5 checksum:    31688 76f041c97200593230de7d75b74a27fa
          Size/MD5 checksum:     9982 0391cd8403375b732364729533195baa
          Size/MD5 checksum:     7710 39351976e1843f6c376864d578c88f8a
          Size/MD5 checksum:     9762 c012baa4e698f48e6e74562f6f626d83
          Size/MD5 checksum:    85796 b9ef96842ea07aa90f55e5ed9a22fcc6
      Intel IA-32 architecture:
          Size/MD5 checksum:    31702 06f4eb45fef2f3bdc3240489e54ddb94
          Size/MD5 checksum:     9986 584fe5ff49d360476ebf7ae799f55d78
          Size/MD5 checksum:     7702 3deb08407cafe11d7f6560992aab1548
          Size/MD5 checksum:     9754 8281e82d5e9a586d9f7c65e56cdb9d5e
          Size/MD5 checksum:    85934 88583de865d2a8a71642c573a581b37c
      Intel IA-64 architecture:
          Size/MD5 checksum:    52488 9f27903c254017232f683d241291554a
          Size/MD5 checksum:     9966 c7892d31d784570e0b850f830de54b7a
          Size/MD5 checksum:     7702 432d440f8eed3064669685ba2137e675
          Size/MD5 checksum:     9744 16db3ffd78cf03be43f42d3dbad42abd
          Size/MD5 checksum:    99776 b4ad9bfa2138c815e6ef0bdce451ad1f
      HP Precision architecture:
          Size/MD5 checksum:    38698 6354e42a8825547180e1d72ce88d4411
          Size/MD5 checksum:     9988 a3840b6d07ecbbb331013b2974793f9b
          Size/MD5 checksum:     7718 2814bb4c2ba66acfd115592696e11c20
          Size/MD5 checksum:     9760 fd04955f15e8bcbe9beedaafd63451d4
          Size/MD5 checksum:    89728 5790238a67c16dddad04cc4dedc59402
      Motorola 680x0 architecture:
          Size/MD5 checksum:    30386 d9371b8ca860a6c8cc528398d443dc24
          Size/MD5 checksum:     9996 3f02bfe83fd648b29334f5ba13ef935a
          Size/MD5 checksum:     7726 43da03e0fb11e24d1a7942594caa2755
          Size/MD5 checksum:     9782 258b1435fb6e52dd6dc9aacbe316a37e
          Size/MD5 checksum:    84936 7d4b51710a752d7f6a53e75b90485441
      Big endian MIPS architecture:
          Size/MD5 checksum:    37616 d1d9383cbba7b1051729d82a27923808
          Size/MD5 checksum:     9988 acd934a8f93dac2ea887fd86394e24d8
          Size/MD5 checksum:     7708 0297eb5910e632c7c06541aaca5773a3
          Size/MD5 checksum:     9760 56a6a6b1c5ba18de262805bbb286a4ae
          Size/MD5 checksum:    89832 c5195e55151d73bb957aa1a438a44580
      Little endian MIPS architecture:
          Size/MD5 checksum:    37664 ca340f34aa9ca4f4d4dca605c07a65ce
          Size/MD5 checksum:     9994 262df132d4996cac3011e6721da75864
          Size/MD5 checksum:     7718 185ff2b06601d9be54ff24ff9970b7c8
          Size/MD5 checksum:     9768 cf246ff96396e47d46bbb93051aa2352
          Size/MD5 checksum:    89710 dd9288abb1040c1e7abfcd60d77853e3
      PowerPC architecture:
          Size/MD5 checksum:    34250 18d79adacdd40dc28c0a98b935123a44
          Size/MD5 checksum:     9984 7fabecb34944b6c91c3d715828ff1c29
          Size/MD5 checksum:     7702 7879e85df4b5784d88e4d399151376ce
          Size/MD5 checksum:     9762 8bc79b825932c9fc610eb0da1a0ae363
          Size/MD5 checksum:    87626 e35e6dfcae22dc627323bc1c0b9a708c
      IBM S/390 architecture:
          Size/MD5 checksum:    32818 57a6010ead7b7198e3821d1ecc59b3f7
          Size/MD5 checksum:     9978 db8df580e4191d72f6816ec16e08e31b
          Size/MD5 checksum:     7704 5b27db7bc128e9321bbe3e5ba6e73bc7
          Size/MD5 checksum:     9756 a12f26e225fa2afe304177a0fc3628ec
          Size/MD5 checksum:    87528 59e1740f6ef624130ff3e27ed81b92d4
      Sun Sparc architecture:
          Size/MD5 checksum:    32670 f44e6c6b05e3b4eb5badaa0c02b982fb
          Size/MD5 checksum:     9980 da61d5ef0adf05de8a8f336630c4b42b
          Size/MD5 checksum:     7710 16c0477e0c3c5143e0b78824b16ca986
          Size/MD5 checksum:     9758 1aff618c6a6547f6ad4a2f425d65ed48
          Size/MD5 checksum:    89076 12602177603319651d1084cd86edbebf
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"22","type":"x","order":"1","pct":34.92,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"13","type":"x","order":"2","pct":20.63,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"28","type":"x","order":"3","pct":44.44,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.