SuSE: 'joe' vulnerability

    Date28 Mar 2001
    CategorySuSE
    2359
    Posted ByLinuxSecurity Advisories
    A bug in joe(1), a userfriendly text editor, was found by Christer Öberg of Wkit Security AB a few weeks ago.
    
    ______________________________________________________________________________
    
                            SuSE Security Announcement
    
            Package:                joe
            Announcement-ID:        SuSE-SA:2001:09
            Date:                   Tuesday, March 27th, 2001 17.03 MEST
            Affected SuSE versions: 6.1, 6.2, 6.3, 6.4, 7.0, 7.1
            Vulnerability Type:     local privilege escalation
            Severity (1-10):        3
            SuSE default package:   yes
            Other affected systems: all system using joe
    
            Content of this advisory:
            1) security vulnerability resolved: joe
               problem description, discussion, solution and upgrade information
            2) pending vulnerabilities, solutions, workarounds
            3) standard appendix (further information)
    
    ______________________________________________________________________________
    
    1)  problem description, brief discussion, solution, upgrade information
    
        A bug in joe(1), a userfriendly text editor, was found by  Christer Öberg
        of Wkit Security AB a few weeks ago.
        After starting joe(1) it tries to open its configuration file joerc in the
        current directory, the users home directory and some other locations.
        joe(1) doesn't check the ownership of joerc when trying the current
        directory.
        An attacker could place a malicious joerc file in a public writeable
        directory, like /tmp, to execute commands with the privilege of any user
        (including root), which runs joe while being in this directory.
    
        Download the update package from locations desribed below and install
        the package with the command `rpm -Uhv file.rpm'. The md5sum for each
        file is in the line below. You can verify the integrity of the rpm
        files using the command
            `rpm --checksig --nogpg file.rpm',
        independently from the md5 signatures below.
    
    
    
        i386 Intel Platform:
    
        SuSE-7.1
         ftp://ftp.suse.com/pub/suse/i386/update/7.1/ap1/joe-2.8-300.i386.rpm
          3140f1eb79eb246ad98f7687de517371
        source rpm:
         ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/joe-2.8-300.src.rpm
          0c04bb25b8ae452f1fcdfe11af32e1b6
    
        SuSE-7.0
         ftp://ftp.suse.com/pub/suse/i386/update/7.0/ap1/joe-2.8-304.i386.rpm
          2a406de36322fc7bc28aaeca0bbdf54d
        source rpm:
         ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/joe-2.8-304.src.rpm
          2aac0d130597d580d96c75d59397958c
    
        SuSE-6.4
         ftp://ftp.suse.com/pub/suse/i386/update/6.4/ap1/joe-2.8-303.i386.rpm
          348a5e4a981f76943c77431606e5c3b2
        source rpm:
         ftp://ftp.suse.com/pub/suse/i386/update/6.4/zq1/joe-2.8-303.src.rpm
          9f938aa365460257baf56f5f92f565ee
    
        SuSE-6.3
         ftp://ftp.suse.com/pub/suse/i386/update/6.3/ap1/joe-2.8-302.i386.rpm
          236ec54a0251859e1c2c1fc4018b5dae
        source rpm:
         ftp://ftp.suse.com/pub/suse/i386/update/6.3/zq1/joe-2.8-302.src.rpm
          49b638dd238cacc8e99048ee5a8024ea
    
        SuSE-6.2
         ftp://ftp.suse.com/pub/suse/i386/update/6.2/ap1/joe-2.8-302.i386.rpm
          094577b41a2ad5baa0d16f4d53378d0e
        source rpm:
         ftp://ftp.suse.com/pub/suse/i386/update/6.2/zq1/joe-2.8-302.src.rpm
          78333a2bac40b08db1e54ccaf1380caf
    
        SuSE-6.1
         ftp://ftp.suse.com/pub/suse/i386/update/6.1/ap1/joe-2.8-305.i386.rpm
          72fbb78af21f3878f1ae8b8bc87c96f4
        source rpm:
         ftp://ftp.suse.com/pub/suse/i386/update/6.1/zq1/joe-2.8-305.src.rpm
          b4fbe27a24bf66d60db45da3c3d13020
    
    
    
        Sparc Platform:
    
        SuSE-7.1
         ftp://ftp.suse.com/pub/suse/sparc/update/7.1/ap1/joe-2.8-290.sparc.rpm
          eeb78e413ee0b48d39ccdab29228ae80
        source rpm:
         ftp://ftp.suse.com/pub/suse/sparc/update/7.1/zq1/joe-2.8-290.src.rpm
          f29199161ffd38f3f26c82b5d21ba89b
    
        SuSE-7.0
         ftp://ftp.suse.com/pub/suse/sparc/update/7.0/ap1/joe-2.8-292.sparc.rpm
          d1d70f58df37de53f05734d90be596fa
        source rpm:
         ftp://ftp.suse.com/pub/suse/sparc/update/7.0/zq1/joe-2.8-292.src.rpm
          45091ece9cb66e4f093d07b0386fd2b9
    
    
    
        AXP Alpha Platform:
    
        SuSE-7.0
         ftp://ftp.suse.com/pub/suse/axp/update/7.0/ap1/joe-2.8-296.alpha.rpm
          85e609519bbfbbc0be5aec7b8de2dffc
        source rpm:
         ftp://ftp.suse.com/pub/suse/axp/update/7.0/zq1/joe-2.8-296.src.rpm
          ce623f8a73b1f6395eb9498324cc1e21
    
    
        SuSE-6.4
         ftp://ftp.suse.com/pub/suse/axp/update/6.4/ap1/joe-2.8-293.alpha.rpm
          d930c6a2f0757f51f04409946f6152f8
        source rpm:
         ftp://ftp.suse.com/pub/suse/axp/update/6.4/zq1/joe-2.8-293.src.rpm
          0b20e5bd36f0feeaf78cb4815566e982
    
        SuSE-6.3
         ftp://ftp.suse.com/pub/suse/axp/update/6.3/ap1/joe-2.8-293.alpha.rpm
          6278e4dd4a42d4e091d1a08e3f617fa2
        source rpm:
         ftp://ftp.suse.com/pub/suse/axp/update/6.3/zq1/joe-2.8-293.src.rpm
          88f428cc9c916b9159dfb54144c7802e
    
        SuSE-6.1
         ftp://ftp.suse.com/pub/suse/axp/update/6.1/ap1/joe-2.8-295.alpha.rpm
          3e531066b0495be2261f02ef2d4583f0
        source rpm:
         ftp://ftp.suse.com/pub/suse/axp/update/6.1/zq1/joe-2.8-295.src.rpm
          1d7796f1fad01365e40a944f0db84470
    
    
    
        PPC PowerPC Platform:
    
        SuSE-7.1
         ftp://ftp.suse.com/pub/suse/ppc/update/7.1/ap1/joe-2.8-272.ppc.rpm
          f11094b9f1afeb04786030e3a140ed03
        source rpm:
         ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/joe-2.8-272.src.rpm
          4058ea46c9d75976a24a6ac419fc19d5
    
        SuSE-7.0
         ftp://ftp.suse.com/pub/suse/ppc/update/7.0/ap1/joe-2.8-274.ppc.rpm
          c385a2ca601cf9b01ad2d39433d6a872
        source rpm:
         ftp://ftp.suse.com/pub/suse/ppc/update/7.0/zq1/joe-2.8-274.src.rpm
          b667ea68d356a9582d3696ad68869c69
    
        SuSE-6.4
         ftp://ftp.suse.com/pub/suse/ppc/update/6.4/ap1/joe-2.8-273.ppc.rpm
          4f6c2c20e961aea4987381d12692af6c
        source rpm:
         ftp://ftp.suse.com/pub/suse/ppc/update/6.4/zq1/joe-2.8-273.src.rpm
          8c3ebda871c54afc11a24d80d207c34e
    
    ______________________________________________________________________________
    
    2)  Pending vulnerabilities in SuSE Distributions and Workarounds:
    
        - We are in the process of preparing update packages for the man package
          which has been found vulnerable to a commandline format string bug.
          The man command is installed suid man on SuSE systems. When exploited,
          the bug can be used to install a different man binary to introduce a
          trojan into the system. As an interim workaround, we recommend to
          `chmod -s /usr/bin/man´ and ignore the warnings and errors when
          viewing manpages.
    
        - The file browser MidnightCommander (mc) is vulnerable to unwanted
          program execution. Updates are currently being built.
    
        - Two bugs were found in the text editor vim. These bugs are currently
          being fixed.
    
        - A bufferoverflow in sudo was discovered and fixed RPMs will be available
          as soon as possible. A exploit was not made public until now.
    
    ______________________________________________________________________________
    
    3)  standard appendix:
    
        SuSE runs two security mailing lists to which any interested party may
        subscribe:
    
        This email address is being protected from spambots. You need JavaScript enabled to view it.
            -   general/linux/SuSE security discussion.
                All SuSE security announcements are sent to this list.
                To subscribe, send an email to
                    <This email address is being protected from spambots. You need JavaScript enabled to view it.>.
    
        This email address is being protected from spambots. You need JavaScript enabled to view it.
            -   SuSE's announce-only mailing list.
                Only SuSE's security annoucements are sent to this list.
                To subscribe, send an email to
                    <This email address is being protected from spambots. You need JavaScript enabled to view it.>.
    
        For general information or the frequently asked questions (faq)
        send mail to:
            <This email address is being protected from spambots. You need JavaScript enabled to view it.> or
            <This email address is being protected from spambots. You need JavaScript enabled to view it.> respectively.
    
        ===============================================
        SuSE's security contact is <This email address is being protected from spambots. You need JavaScript enabled to view it.>.
        ===============================================
    
    ______________________________________________________________________________
    
        The information in this advisory may be distributed or reproduced,
        provided that the advisory is not modified in any way.
        SuSE GmbH makes no warranties of any kind whatsoever with respect
        to the information contained in this security advisory.
    
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":56.1,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.2,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":31.71,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.