Guardian Digital Security Advisory | September 11, 2003 |
http://www.guardiandigital.com | ESA-20030911-022 |
Package: | pine |
Summary: | Multiple remote vulnerabilities. |
EnGarde Secure Linux is an enterprise class Linux platform
engineered to enable corporations to quickly and cost-effectively
build a complete and secure Internet presence while preventing
Internet threats.
OVERVIEW
The pine e-mail client shipped with EnGarde Secure Linux contains
buffer overflows which may be exploited by a remote attacker by
sending the victim a specially crafted email. This vulnerability
may allow the remote attacker to execute arbitrary code under the
victims user ID.
Guardian Digital products affected by this issue include:
EnGarde Secure Community v1.0.1
EnGarde Secure Community 2
EnGarde Secure Professional v1.1
EnGarde Secure Professional v1.2
EnGarde Secure Professional v1.5
It is recommended that all users apply this update as soon as
possible.
SOLUTION
Guardian Digital Secure Network subscribers may automatically
update affected systems by accessing their account from within the
Guardian Digital WebTool.
To modify your GDSN account and contact preferences, please go
to:
https://www.guardiandigital.com/account/
Below are MD5 sums for the updated EnGarde Secure Linux 1.0.1
packages:
SRPMS/pine-4.50-1.0.10.src.rpm
MD5 Sum: 194e71f6eda0c88e1376bf307c534b8e
i386/pine-4.50-1.0.10.i386.rpm
MD5 Sum: a3824cfc713c687f0de9f3e4f00b4361
i686/pine-4.50-1.0.10.i686.rpm
MD5 Sum: dfdd1ac95d87d7aed0ec555823bad56e
REFERENCES
Guardian Digital’s public key:
http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY
Pine’s Official Web Site:
http://www.washington.edu/pine/
Guardian Digital Advisories:
http://infocenter.guardiandigital.com/advisories/
Security Contact: [email protected]
Author: Ryan W. Maple <[email protected]>
Copyright 2003, Guardian Digital, Inc.