dcsimg
Linux Today: Linux News On Internet Time.





More on LinuxToday


Gentoo Linux Advisories: mutt, bitchx, openssl

Mar 24, 2003, 17:27 (0 Talkback[s])

- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-19
- - ---------------------------------------------------------------------

          PACKAGE : mutt
          SUMMARY : buffer overflow
             DATE : 2003-03-22 18:19 UTC
          EXPLOIT : local
VERSIONS AFFECTED : <1.4.1
    FIXED VERSION : >=1.4.1
              CVE : CAN-2003-0140

- - ---------------------------------------------------------------------

- From advisory:

"By controlling a malicious IMAP server and providing a specially 
crafted folder, an attacker can crash the mail reader and possibly 
force execution of arbitrary commands on the vulnerable system with 
the privileges of the user running Mutt."

Read the full advisory at:
http://www.coresecurity.com/common/showdoc.php?idx=310&idxseccion=10

SOLUTION

It is recommended that all Gentoo Linux users who are running
net-mail/mutt upgrade to mutt-1.4.1 as follows:

emerge sync
emerge mutt
emerge clean

- - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz
- - ---------------------------------------------------------------------

- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-21
- - ---------------------------------------------------------------------

          PACKAGE : bitchx
          SUMMARY : buffer overflow
             DATE : 2003-03-24 11:56 UTC
          EXPLOIT : remote
VERSIONS AFFECTED : <1.0.19-r5
    FIXED VERSION : >=1.0.19-r5
              CVE : 

- - ---------------------------------------------------------------------

- From advisory:

"Full of sprintf() calls and relying on BIG_BUFFER_SIZE being large 
enough. There's multiple ways to exploit it by giving 
near-BIG_BUFFER_SIZE strings in various places."

Read the full advisory at:
http://marc.theaimsgroup.com/?l=bugtraq&m=104766521328322&w=2

SOLUTION

It is recommended that all Gentoo Linux users who are running
net-irc/bitchx upgrade to bitchx-1.0.19-r5 as follows:

emerge sync
emerge bitchx
emerge clean

- - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz
- - ---------------------------------------------------------------------


- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-20
- - ---------------------------------------------------------------------

          PACKAGE : openssl
          SUMMARY : Klima-Pokorny-Rosa attack
             DATE : 2003-03-24 11:51 UTC
          EXPLOIT : remote
VERSIONS AFFECTED : <0.9.6i-r2
    FIXED VERSION : >=0.9.6i-r2
              CVE : CAN-2003-0131

- - ---------------------------------------------------------------------

- From advisory:

"Czech cryptologists Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa
have come up with an extension of the "Bleichenbacher attack" on RSA
with PKCS #1 v1.5 padding as used in SSL 3.0 and TLS 1.0.  Their
attack requires the attacker to open millions of SSL/TLS connections
to the server under attack; the server's behaviour when faced with
specially made-up RSA ciphertexts can reveal information that in
effect allows the attacker to perform a single RSA private key
operation on a ciphertext of its choice using the server's RSA key.
Note that the server's RSA key is not compromised in this attack."

Read the full advisory at:
http://www.openssl.org/news/secadv_20030319.txt

SOLUTION

It is recommended that all Gentoo Linux users who are running
dev-libs/openssl upgrade to openssl-0.9.6i-r2 as follows:

emerge sync
emerge openssl
emerge clean

- - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz
- - ---------------------------------------------------------------------