Debian: New metamail packages fix arbitrary code execution

    Date12 Mar 2006
    CategoryDebian
    4706
    Posted ByLinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 995-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                                 Steve Kemp
    March 13th, 2006                        http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : metamail
    Vulnerability  : buffer overflow
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2006-0709
    BugTraq ID     : 16611
    Debian Bug     : 352482
    
    Ulf Harnhammar discoverd a buffer overflow in metamail, an
    implementation of MIME (Multi-purpose Internet Mail Extensions), that
    could lead to a denial of service or potentially execute arbitrary
    code when processing messages.
    
    For the old stable distribution (woody) this problem has been fixed in
    version 2.7-45woody.4.
    
    For the stable distribution (sarge) this problem has been fixed in
    version 2.7-47sarge1.
    
    For the unstable distribution (sid) this problem has been fixed in
    version 2.7-51.
    
    We recommend that you upgrade your metamail package.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4.dsc
          Size/MD5 checksum:      613 6ee8aeff0f14e5d799a670fe727039c7
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4.diff.gz
          Size/MD5 checksum:   333628 22588d5a91f53fdc1a6458c5519d2512
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7.orig.tar.gz
          Size/MD5 checksum:   156656 c6967e9bc5d3c919764b02df24efca01
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_alpha.deb
          Size/MD5 checksum:   166084 a45a36ff283de7cb3ab3e43694f90c45
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_arm.deb
          Size/MD5 checksum:   153404 52e740cb6dbc32c860da10010bb90571
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_i386.deb
          Size/MD5 checksum:   150578 4d3e962558adfd7f43859b9f7fd30450
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_ia64.deb
          Size/MD5 checksum:   205790 1e9d9f11ca4fbb1863db2e205d808c23
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_hppa.deb
          Size/MD5 checksum:   153406 7897b81f6f0ee82abbcf415e258d8c9d
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_m68k.deb
          Size/MD5 checksum:   146400 a3cc53e414d0e60e54e4ac92849b4d0d
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_mips.deb
          Size/MD5 checksum:   158558 82cd3b0bb263e24f0a6f7c500a01d0af
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_mipsel.deb
          Size/MD5 checksum:   158562 b0a037641e1fa292decffa319cf75daf
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_powerpc.deb
          Size/MD5 checksum:   148694 f326ccce8fd7cf2445e0f716fcc65143
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_s390.deb
          Size/MD5 checksum:   151512 ad0e4e1d1ee73ac300e4f1dc07bcfb5d
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_sparc.deb
          Size/MD5 checksum:   155492 cf37f006621cbff83fb236afd8bfc223
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1.dsc
          Size/MD5 checksum:      594 3131f64cf684d62318636b8589acbc94
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1.diff.gz
          Size/MD5 checksum:   340408 165af1d9cff83f10103ebddfdb90f2ad
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7.orig.tar.gz
          Size/MD5 checksum:   156656 c6967e9bc5d3c919764b02df24efca01
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_alpha.deb
          Size/MD5 checksum:   168190 f31837660b8971eecd951def396c0379
    
      AMD64 architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_amd64.deb
          Size/MD5 checksum:   160420 ff733653f1d7df67115d61fa8df86406
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_arm.deb
          Size/MD5 checksum:   154186 937894d91d29082fa76ffea6d54e756f
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_i386.deb
          Size/MD5 checksum:   148676 58b08e364eefebe313a6fb6308ed5bf9
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_ia64.deb
          Size/MD5 checksum:   198062 fce924b058a6b833bf18f9f2ecbc4456
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_hppa.deb
          Size/MD5 checksum:   159538 7bd1f8661de8ef52f7391022a12b023b
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_m68k.deb
          Size/MD5 checksum:   148334 03af976c9a4f9e84493b8740ec97d459
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_mips.deb
          Size/MD5 checksum:   166488 c228360db9655a46526ae72ff190d170
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_mipsel.deb
          Size/MD5 checksum:   166320 120c2c081b45c4d7d90a58e65a11f984
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_powerpc.deb
          Size/MD5 checksum:   160878 ada001589f143bbe6215f12507ce6c4c
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_s390.deb
          Size/MD5 checksum:   158718 0f70d83bff2a30d8dab1d798072d4157
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_sparc.deb
          Size/MD5 checksum:   152086 b4776767e71f5202a4a188d032762b24
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"4","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":14.29,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.