TurboLinux Security Announcement: Package: nmh-1.0.2 and earlierMar 22, 2000, 06:52 (0 Talkback[s])
(Other stories by Katie Moussouris)
Date: Tue, 21 Mar 2000 17:06:26 -0800 (PST)
TurboLinux Security Announcement
Package: nmh-1.0.2 and earlier
Affected TurboLinux versions: 6.0.2 and earlier
A security hole was discovered in the package mentioned above. Please update the package in your installation as soon as possible or disable the service.
1. Problem Summary
A buffer overrun exists in nmh versions 1.0.2 and prior. Due to improper MIME header parsing, an attacker could create a MIME message such that the mhshow utility may be used to execute shell code when the message is viewed.
An attacker can use this exploit to remotely execute code on the machine where nmh is being used to read mail. This could easily lead to a remote root compromise.
Update the package from our ftp server by running the following command:
rpm -Fv ftp_path_to_filename
Where ftp_path_to_filename is the following:
The source rpm can be downloaded here:
**Note: You must rebuild and install the rpm if you choose to download and install the srpm. Simply installing the srpm alone WILL NOT CLOSE THE SECURITY HOLE.
Please verify the md5 checksum of the update before you install:
MD5 sum Package Name
f69c396498cac8c8da72e6ea122ed456 nmh-1.0.3-0.i386.rpm 27bcd2c1cb6a8424861ce26b5304cc9c nmh-1.0.3-0.src.rpm
You can find more updates on our ftp server:
for TL6.0 Workstation and Server security updates
Our webpage for security announcements:
If you want to report vulnerabilities, please contact:
Subscribe to the TurboLinux Security Mailing lists:
TL-security - A moderated list for discussing security issues in TurboLinux products.
TL-security-announce - An announce-only mailing list for security updates and alerts.