Debian: New masqmail packages fix several vulnerabilities

    Date08 Oct 2005
    CategoryDebian
    5731
    Posted ByJoe Shakespeare
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 848-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                             Martin Schulze
    October 8th, 2005                       http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : masqmail
    Vulnerability  : several
    Problem type   : local
    Debian-specific: no
    CVE ID         : CAN-2005-2662 CAN-2005-2663
    
    Jens Steube discovered two vulnerabilities in masqmail, a mailer for
    hosts without permanent internet connection.  The Common
    Vulnerabilities and Exposures project identifies the following
    problems:
    
    CAN-2005-2662
    
        When sending failed mail messages, the address is not sanitised,
        which allows a local attacker to execute arbitrary commands as the
        mail user.
    
    CAN-2005-2663
    
        When opening the log file, masqmail does not relinquish
        privileges, which allows a local attacker to overwrite arbitrary
        files via a symlink attack.
    
    For the old stable distribution (woody) these problems have been fixed in
    version 0.1.16-2.2.
    
    For the stable distribution (sarge) these problems have been fixed in
    version 0.2.20-1sarge1.
    
    For the unstable distribution (sid) these problems have been fixed in
    version 0.2.20-1sarge1.
    
    We recommend that you upgrade your masqmail package.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2.dsc
          Size/MD5 checksum:      616 c8e56189f4776243e9ac8216fe96eca9
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2.diff.gz
          Size/MD5 checksum:    10607 fede79dec7ac68712cd6ca66ecd11b95
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16.orig.tar.gz
          Size/MD5 checksum:   174634 0e391fd2d56d61b0a879f3c37b9e068d
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_alpha.deb
          Size/MD5 checksum:   103730 9c5b4acb97b0ee7e2f0f5e0d7eb41f0d
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_arm.deb
          Size/MD5 checksum:    90844 c9d4a0931baa6dc4ff2b600768bbea87
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_i386.deb
          Size/MD5 checksum:    88450 f384d634c4148d2a8349fbfa68aeaa03
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_ia64.deb
          Size/MD5 checksum:   123742 2a3274281a32af576661b35d3f6460d2
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_hppa.deb
          Size/MD5 checksum:    99124 efd80fc98022573d9b7c4ca59458bce4
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_m68k.deb
          Size/MD5 checksum:    86290 584bd580fa155e0e7de620fcbe475781
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_mips.deb
          Size/MD5 checksum:    97430 cfd5b01c3cea7a26114fa8ed823f2b36
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_mipsel.deb
          Size/MD5 checksum:    97608 4bf6407d3799514f1a64428be64e1703
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_powerpc.deb
          Size/MD5 checksum:    92066 11278851463d715a78dd427c885d6c71
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_s390.deb
          Size/MD5 checksum:    91252 41a3393aa6c556af480a0091f4859b3a
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_sparc.deb
          Size/MD5 checksum:    92774 1e13a66f9a0e338304141d446c6a44c3
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1.dsc
          Size/MD5 checksum:      553 071de088ea2cf173f7df397f5b9a2e00
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1.tar.gz
          Size/MD5 checksum:   243780 38ab6b58d99e93b6688ae958d92c0f3c
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_alpha.deb
          Size/MD5 checksum:   143574 4a0e11af8b79ddb53e84f3e8f3e7d0e9
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_arm.deb
          Size/MD5 checksum:   121910 6c020669757396b5b9c959b5683228da
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_i386.deb
          Size/MD5 checksum:   122054 696d177b8524e13a0de5da6be97a3c70
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_ia64.deb
          Size/MD5 checksum:   162460 fffa1b99ace83cb1fbd55f93437e2132
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_hppa.deb
          Size/MD5 checksum:   131458 d0e0424020639e6971168d900ace0eb2
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_m68k.deb
          Size/MD5 checksum:   116914 a7ff06c51610f661e28166007a5ff835
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_mips.deb
          Size/MD5 checksum:   132456 b51be0307d9498a5093343326e556957
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_mipsel.deb
          Size/MD5 checksum:   132794 59a7ee664a2721b43b5b97dbb7462bc8
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_powerpc.deb
          Size/MD5 checksum:   131814 2298b05e9090956e9d977f96dfb470a2
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_s390.deb
          Size/MD5 checksum:   129204 1c022f2ca6ff2b707b7412fb6cebe4a0
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_sparc.deb
          Size/MD5 checksum:   122814 17e02dac3320ea6e4625fadad6e5a1e8
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"64","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.39,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.46,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.