News

Wednesday, September 26, 2007

ubuntu-security-announce Digest, Vol 36, Issue 10

Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com

To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com

You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."


Today's Topics:

1. [USN-519-1] elinks vulnerability (Kees Cook)
2. [USN-520-1] fetchmail vulnerabilities (Kees Cook)


----------------------------------------------------------------------

Message: 1
Date: Tue, 25 Sep 2007 14:51:37 -0700
From: Kees Cook <kees@ubuntu.com>
Subject: [USN-519-1] elinks vulnerability
To: ubuntu-security-announce@lists.ubuntu.com
Cc: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com
Message-ID: <20070925215137.GR22678@outflux.net>
Content-Type: text/plain; charset="us-ascii"

===========================================================
Ubuntu Security Notice USN-519-1 September 25, 2007
elinks vulnerability
CVE-2007-5034
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
elinks 0.10.6-1ubuntu3.2

Ubuntu 6.10:
elinks 0.11.1-1ubuntu2.2

Ubuntu 7.04:
elinks 0.11.1-1.2ubuntu2.2

In general, a standard system upgrade is sufficient to affect the
necessary changes.

Details follow:

Kalle Olavi Niemitalo discovered that if elinks makes a POST request
to an HTTPS URL through a proxy, information may be sent in clear-text
between elinks and the proxy. Attackers with access to the network
could steal sensitive information (such as passwords).


Updated packages for Ubuntu 6.06 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2.diff.gz

Size/MD5: 31374 745db778d8da48d5bd8fd62313c299d9

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2.dsc

Size/MD5: 738 c0ea523a913d279a70c8a74ae91710be

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6.orig.tar.gz

Size/MD5: 3651428 0243203b9e54cf0cf002fca31244ce79

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_amd64.deb

Size/MD5: 906814 2923d69aaad9fdf510f0778938a52890

http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_amd64.deb

Size/MD5: 732418 08d581518d511b015357b636b4b4bec2

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_i386.deb

Size/MD5: 845344 b17b1d3b39e18b37244fa9803d727e28

http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_i386.deb

Size/MD5: 682980 7c5d2abc9e6be4a33d751cbeea3eacac

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_powerpc.deb

Size/MD5: 889800 008c03be901b15f7245786b29c835712

http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_powerpc.deb

Size/MD5: 720926 d035afed6c4fefd680961719da376c66

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_sparc.deb

Size/MD5: 862606 47b706af007c5e742d292975d2976d40

http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_sparc.deb

Size/MD5: 697554 6a69e45f969f2f9322c2e120b024cc59

Updated packages for Ubuntu 6.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2.diff.gz

Size/MD5: 30804 7375454f7de82c81875704c8ace8fbfa

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2.dsc

Size/MD5: 747 ac4ab40f6c646071391977da8803c6a3

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1.orig.tar.gz

Size/MD5: 3863617 dce0fa7cb2b6e7194ddd00e34825218b

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_amd64.deb

Size/MD5: 663838 f01381b5e0c58a16def5bbe48400033d

http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_amd64.deb

Size/MD5: 460418 374d2e22edbaa346dec5f20d8959fbe3

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_i386.deb

Size/MD5: 621490 8b7c70e58374453a00d9be6985287f6b

http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_i386.deb

Size/MD5: 418576 c46df44d6a25bd29f9e1030ac1736fc5

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_powerpc.deb

Size/MD5: 656474 6a91b696b81c1498201610c53e475488

http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_powerpc.deb

Size/MD5: 453276 5490e3dccea1d7e4e9217b060eafdac7

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_sparc.deb

Size/MD5: 623180 88567da087d6bafc207e1c2ae36f00f9

http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_sparc.deb

Size/MD5: 420738 a93466a63b8738442b9b7b8a8956d172

Updated packages for Ubuntu 7.04:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2.diff.gz

Size/MD5: 30996 47f76e223281a4766374ad9bfd28b2b4

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2.dsc

Size/MD5: 835 04e6aa0377c01a16a342b0515f4ed67d

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1.orig.tar.gz

Size/MD5: 3863617 dce0fa7cb2b6e7194ddd00e34825218b

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_amd64.deb

Size/MD5: 667320 1ac7f9264a8116cfa941714ef2883baf

http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_amd64.deb

Size/MD5: 469024 4a9ed475d63bb65ff94b1e2e6cf4f22b

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_i386.deb

Size/MD5: 625670 73987ab1453f8064741a48c1b1c29c3e

http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_i386.deb

Size/MD5: 425266 61137c1a5ed972040f2ce3866dbc4960

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_powerpc.deb

Size/MD5: 665316 9322259cb40f15081498b34af26ccae4

http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_powerpc.deb

Size/MD5: 463014 b743d08aae093f63c2181f702a5ec810

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_sparc.deb

Size/MD5: 631170 b163c245dadaadc10352694f741fe0d9

http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_sparc.deb

Size/MD5: 430040 ff48526da8dd46fd2e3c012756fa52de

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20070925/3da008b0/attachment-0001.pgp


------------------------------

Message: 2
Date: Tue, 25 Sep 2007 19:15:13 -0700
From: Kees Cook <kees@ubuntu.com>
Subject: [USN-520-1] fetchmail vulnerabilities
To: ubuntu-security-announce@lists.ubuntu.com
Cc: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com
Message-ID: <20070926021513.GV22678@outflux.net>
Content-Type: text/plain; charset="us-ascii"

===========================================================
Ubuntu Security Notice USN-520-1 September 26, 2007
fetchmail vulnerabilities
CVE-2007-1558, CVE-2007-4565
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
fetchmail 6.3.2-2ubuntu2.2

Ubuntu 6.10:
fetchmail 6.3.4-1ubuntu4.2

Ubuntu 7.04:
fetchmail 6.3.6-1ubuntu2.1

In general, a standard system upgrade is sufficient to affect the
necessary changes.

Details follow:

Gaetan Leurent discovered a vulnerability in the APOP protocol based
on MD5 collisions. As fetchmail supports the APOP protocol, this
vulnerability can be used by attackers to discover a portion of the APOP
user's authentication credentials. (CVE-2007-1558)

Earl Chew discovered that fetchmail can be made to de-reference a NULL
pointer when contacting SMTP servers. This vulnerability can be used
by attackers who control the SMTP server to crash fetchmail and cause
a denial of service. (CVE-2007-4565)


Updated packages for Ubuntu 6.06 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2-2ubuntu2.2.diff.gz

Size/MD5: 190508 b6f34c90edfb5be3fa625572e440d46f

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2-2ubuntu2.2.dsc

Size/MD5: 766 b0ee07dc6149dff8fcabf8e3806fb14c

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2.orig.tar.gz

Size/MD5: 1522264 a661735496077232acedb82a901fa499

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/universe/f/fetchmail/fetchmailconf_6.3.2-2ubuntu2.2_all.deb

Size/MD5: 114918 183fcecaabaa9fd0dc78f5fa0cf66899

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2-2ubuntu2.2_amd64.deb

Size/MD5: 346852 0562c7d3159da530a247492eb4c83c17

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2-2ubuntu2.2_i386.deb

Size/MD5: 333422 1d96517ee7118ddb6c154b42f20282c3

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2-2ubuntu2.2_powerpc.deb

Size/MD5: 345546 1ab1bc976af5e02880ccfeb277a1e3ab

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.2-2ubuntu2.2_sparc.deb

Size/MD5: 339632 5eae85ff0d41ca36030c985d828cc1b9

Updated packages for Ubuntu 6.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4-1ubuntu4.2.diff.gz

Size/MD5: 54883 9f96afa7114c4ff7d83d52ddff3a7734

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4-1ubuntu4.2.dsc

Size/MD5: 765 5896f0d44a778f5aa234e5645fde1d1c

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4.orig.tar.gz

Size/MD5: 1313880 023a27d8281e5362323dec3e1ccca1c8

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/universe/f/fetchmail/fetchmailconf_6.3.4-1ubuntu4.2_all.deb

Size/MD5: 60460 60c7b0de630485e35a5ab49c14ab5dc3

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4-1ubuntu4.2_amd64.deb

Size/MD5: 350904 da444d4475fae7453552a5112124912d

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4-1ubuntu4.2_i386.deb

Size/MD5: 341816 5367a81a858f9c590c4a4947f1a45983

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4-1ubuntu4.2_powerpc.deb

Size/MD5: 350320 d82081bf97a28bc745a5342cfba46988

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.4-1ubuntu4.2_sparc.deb

Size/MD5: 345394 745ec98c5d2dec4bf6d630650798e92a

Updated packages for Ubuntu 7.04:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6-1ubuntu2.1.diff.gz

Size/MD5: 56402 05af2c1bb84df24da58935e51d7b6002

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6-1ubuntu2.1.dsc

Size/MD5: 966 8dee518a1b9c90ff5bd5f3eb6a007c1d

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6.orig.tar.gz

Size/MD5: 1680200 04175459cdf32fdb10d9e8fc46b633c3

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/universe/f/fetchmail/fetchmailconf_6.3.6-1ubuntu2.1_all.deb

Size/MD5: 63826 dd31c4c75cd18947cc49ae649ac8717f

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6-1ubuntu2.1_amd64.deb

Size/MD5: 376182 19d7655fafa90d200b5defae11de58ac

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6-1ubuntu2.1_i386.deb

Size/MD5: 365590 a54d1d43f960ae118a4dee6b3aba4a42

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6-1ubuntu2.1_powerpc.deb

Size/MD5: 377260 eb1373f300d8ea78b944bb788d9ca6dd

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/f/fetchmail/fetchmail_6.3.6-1ubuntu2.1_sparc.deb

Size/MD5: 370316 9211fd7fb44b2f3d620958b42d3ddaf7

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20070925/0f63bb46/attachment-0001.pgp


------------------------------

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


End of ubuntu-security-announce Digest, Vol 36, Issue 10
********************************************************

No comments:

Blog Archive