-----BEGIN PGP SIGNED MESSAGE-----


We have become aware that the version mailman as supplied in Debian
GNU/Linux 2.1 has a problem with verifying list administrators. The
problem is that the cookie value generation used was predictable, so
using forged authentication cookies it was possible to access the
list administration webpages without knowing the proper password.
More information about this vulnerability can be found at
 
June/001128.html

This has been fixed in version 1.0rc2-5.

We recommend you upgrade your mailman package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.1 alias slink
- --------------------------------

  This version of Debian was released only for Intel, the Motorola
  680x0, the alpha and the Sun sparc architecture.
  
  Source archives:
     
source/mailman_1.0rc2-5.diff.gz
      MD5 checksum: 096d96ebf89341b148d2ae917037559a
     
source/mailman_1.0rc2-5.dsc
      MD5 checksum: a407c72b6d80163b04ddc5fb895b8fbd
     
es/binary-source/mailman_1.0rc2.orig.tar.gz
      MD5 checksum: 6916959db9144ecaf004fcd9be32a020
  
  Alpha architecture:
     
alpha/mailman_1.0rc2-5_alpha.deb
      MD5 checksum: 0f053b62d9dd51d4e2c0843258eee453
  
  Intel ia32 architecture:
     
i386/mailman_1.0rc2-5_i386.deb
      MD5 checksum: d9b0f93458a41055ba1b39891e0a5ca5
  
  Motorola 680x0 architecture:
     
m68k/mailman_1.0rc2-5_m68k.deb
      MD5 checksum: 94fc7996e4b296a4c944fe08ccb44503
  
  Sun Sparc architecture:
     
sparc/mailman_1.0rc2-5_sparc.deb
      MD5 checksum: e27d100b24d0c87c02cc86b7aadded0d

  

  These files will be copied into
    soon.

Please note you can also use apt to always get the latest security
updates. To do so add the following line to /etc/apt/sources.list:

  deb Debian -- Security Information  
stable updates


- -- 
Debian GNU/Linux      .    Security Managers     .   security@debian.org
              debian-security-announce@lists.debian.org
  Christian Hudon     .     Wichert Akkerman     .     Martin Schulze
   .     .   


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBN3Av9KjZR/ntlUftAQFFjwL/VwNslEzha3yT4k3wwDSedm0XEiHIUCS1
+ngWFIrPnLzfJ/jK2atXAZc98wwFxjxOTDWnGuc4RBjRi4NqBduQsVwaIHelSbK2
u9uPiNvzUhPiCUdzDusjy8ysUmzJIHd8
=PgQB
-----END PGP SIGNATURE-----


New versions of mailman fixes cookie attack

December 13, 1999
We have become aware that the version mailman as supplied in Debian GNU/Linux 2.1 has a problem with verifying list administrators

Summary

We have become aware that the version mailman as supplied in Debian
GNU/Linux 2.1 has a problem with verifying list administrators. The
problem is that the cookie value generation used was predictable, so
using forged authentication cookies it was possible to access the
list administration webpages without knowing the proper password.
More information about this vulnerability can be found at

June/001128.html

This has been fixed in version 1.0rc2-5.

We recommend you upgrade your mailman package immediately.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

Debian GNU/Linux 2.1 alias slink

This version of Debian was released only for Intel, the Motorola
680x0, the alpha and the Sun sparc architecture.

Source archives:

source/mailman_1.0rc2-5.diff.gz
MD5 checksum: 096d96ebf89341b148d2ae917037559a

source/mailman_1.0rc2-5.dsc
MD5 checksum: a407c72b6d80163b04ddc5fb895b8fbd

es/binary-source/mailman_1.0rc2.orig.tar.gz
MD5 checksum: 6916959db9144ecaf004fcd9be32a020

Alpha architecture:

alpha/mailman_1.0rc2-5_alpha.deb
MD5 checksum: 0f053b62d9dd51d4e2c0843258eee453

Intel ia32 architecture:

i386/mailman_1.0rc2-5_i386.deb
MD5 checksum: d9b0f93458a41055ba1b39891e0a5ca5

Motorola 680x0 architecture:

m68k/mailman_1.0rc2-5_m68k.deb
MD5 checksum: 94fc7996e4b296a4c944fe08ccb44503

Sun Sparc architecture:

sparc/mailman_1.0rc2-5_sparc.deb
MD5 checksum: e27d100b24d0c87c02cc86b7aadded0d



These files will be copied into
soon.

Please note you can also use apt to always get the latest security
updates. To do so add the following line to /etc/apt/sources.list:

deb Debian -- Security Information
stable updates


- --
Debian GNU/Linux . Security Managers . security@debian.org
debian-security-announce@lists.debian.org
Christian Hudon . Wichert Akkerman . Martin Schulze
. .


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBN3Av9KjZR/ntlUftAQFFjwL/VwNslEzha3yT4k3wwDSedm0XEiHIUCS1
+ngWFIrPnLzfJ/jK2atXAZc98wwFxjxOTDWnGuc4RBjRi4NqBduQsVwaIHelSbK2
u9uPiNvzUhPiCUdzDusjy8ysUmzJIHd8
=PgQB
-----END PGP SIGNATURE-----





Severity

Related News