[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 81/04 - Three RedHat Security Bulletins



----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 81/04 dated 24.02.04  Time: 12:00  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
----------------------------------------------------------------------------------

Title
=====

Three RedHat Security Bulletins:

1. Updated PWLib packages fix protocol security issues.

2. Updated samba packages fix security vulnerability.

3. Updated metamail packages fix vulnerabilities.


Detail
====== 

1. PWLib is a cross-platform class library designed to support
   the OpenH323 project.  OpenH323 provides an implementation of
   the ITU H.323 teleconferencing protocol, used by packages such 
   as Gnome Meeting.

2. The Samba team discovered an issue that affects version 3.0.0 
   and 3.0.1 of Samba.  If an account for a user is created, but 
   marked as disabled using the mksmbpasswd script, it is possible 
   for Samba to overwrite the user's password with the contents of
   an uninitialized buffer. 

3. Ulf Harnhammar discovered two integer overflow bugs and two buffer
   overflow bugs in versions of Metamail up to and including 2.7.  
   An attacker could create a carefully-crafted message such that when
   it is opened by a victim and parsed through Metamail, it runs arbitrary 
   code as the victim. 






1.
                     ESB-2004.0132 -- RHSA-2004:047-01
            Updated PWLib packages fix protocol security issues
                             20 February 2004


Product:                PWLib
Publisher:              Red Hat
Operating System:       Red Hat Enterprise Linux AS version 3
                        Red Hat Enterprise Linux ES version 3
                        Red Hat Enterprise Linux WS version 3
Impact:                 Denial of Service
                        Execute Arbitrary Code/Commands
Access Required:        Remote
CVE Names:              CAN-2004-0097

Ref:                    ESB-2004.0127
                        ESB-2004.0029

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated PWLib packages fix protocol security issues
Advisory ID:       RHSA-2004:047-01
Issue date:        2004-02-18
Updated on:        2004-02-18
Product:           Red Hat Enterprise Linux
Keywords:          h323 h225
Cross references:  
Obsoletes:         
CVE Names:         CAN-2004-0097
- - ---------------------------------------------------------------------

1. Topic:

Updated PWLib packages that contain fixes for security issues found during protocol testing by the NISCC are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - i386 Red Hat
Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

PWLib is a cross-platform class library designed to support the OpenH323 project.  OpenH323 provides an implementation of the ITU
H.323 teleconferencing protocol, used by packages such as Gnome Meeting.

A test suite for the H.225 protocol (part of the H.323 family) provided by the NISCC uncovered bugs in PWLib prior to version 1.6.0.
An attacker could trigger these bugs by sending carefully crafted messages to an application.  The effects of such an attack can
vary depending on the application, but would usually result in a Denial of Service.  The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2004-0097 to this issue.

Users are advised to upgrade to the erratum packages, which contain backported security fixes and are not vulnerable to these
issues.

Red Hat would like to thank Craig Southeren of the OpenH323 project for providing the fixes for these issues.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those RPMs which are currently installed will be updated.  Those
RPMs which are not installed but included in the list will not be updated.  Note that you can also use wildcards (*.rpm) if your
current directory *only* contains the desired RPMs.

Please note that this update is also available via Red Hat Network.  Many people find this an easier way to apply updates.  To use
Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client
with an updated certificate.  The latest version of up2date is available from the Red Hat FTP site and may also be downloaded
directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

114308 - CAN-2004-0097 PWlib/OpenH323 vulnerabilities

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/pwlib-1.4.7-7.EL.src.rpm

i386:
Available from Red Hat Network: pwlib-1.4.7-7.EL.i386.rpm

ia64:
Available from Red Hat Network: pwlib-1.4.7-7.EL.ia64.rpm

ppc:
Available from Red Hat Network: pwlib-1.4.7-7.EL.ppc.rpm

s390:
Available from Red Hat Network: pwlib-1.4.7-7.EL.s390.rpm

s390x:
Available from Red Hat Network: pwlib-1.4.7-7.EL.s390x.rpm

x86_64:
Available from Red Hat Network: pwlib-1.4.7-7.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/pwlib-1.4.7-7.EL.src.rpm

i386:
Available from Red Hat Network: pwlib-1.4.7-7.EL.i386.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/pwlib-1.4.7-7.EL.src.rpm

i386:
Available from Red Hat Network: pwlib-1.4.7-7.EL.i386.rpm

ia64:
Available from Red Hat Network: pwlib-1.4.7-7.EL.ia64.rpm

x86_64:
Available from Red Hat Network: pwlib-1.4.7-7.EL.x86_64.rpm



7. Verification:

MD5 sum                          Package Name
- - --------------------------------------------------------------------------

26ea22009305d3f464487f6fd249ffb4 3AS/en/os/SRPMS/pwlib-1.4.7-7.EL.src.rpm
ed2a1830fdd4cf9305ad9290d8f0a6ab 3AS/en/os/i386/pwlib-1.4.7-7.EL.i386.rpm
d6612f085ecaff1698a381bfd516e865 3AS/en/os/ia64/pwlib-1.4.7-7.EL.ia64.rpm
64e7a3c71712398a3a985a9210e1a21e 3AS/en/os/ppc/pwlib-1.4.7-7.EL.ppc.rpm
7acdeae69d904f5a577067cf5ff84bc5 3AS/en/os/s390/pwlib-1.4.7-7.EL.s390.rpm
5cd2cdb237e95a9286a964504e62efe3 3AS/en/os/s390x/pwlib-1.4.7-7.EL.s390x.rpm
637821e019bb587740e50e5d9ddabac6 3AS/en/os/x86_64/pwlib-1.4.7-7.EL.x86_64.rpm
26ea22009305d3f464487f6fd249ffb4 3ES/en/os/SRPMS/pwlib-1.4.7-7.EL.src.rpm
ed2a1830fdd4cf9305ad9290d8f0a6ab 3ES/en/os/i386/pwlib-1.4.7-7.EL.i386.rpm
26ea22009305d3f464487f6fd249ffb4 3WS/en/os/SRPMS/pwlib-1.4.7-7.EL.src.rpm
ed2a1830fdd4cf9305ad9290d8f0a6ab 3WS/en/os/i386/pwlib-1.4.7-7.EL.i386.rpm
d6612f085ecaff1698a381bfd516e865 3WS/en/os/ia64/pwlib-1.4.7-7.EL.ia64.rpm
637821e019bb587740e50e5d9ddabac6 3WS/en/os/x86_64/pwlib-1.4.7-7.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key is available from https://www.redhat.com/security/keys.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following
command:
    
    md5sum <filename>


8. References:

http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
http://www.postincrement.com/openh323/nissc_vulnerabilty.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0097

9. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact details at
https://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAMz9OXlSAg2UNWIIRAptrAJ49c79y+/zwfUiVPDwdiaVqfeB13gCgtI7v
gkRzevQlhBAYjzmDFNlQxJs=
=6Icd
- -----END PGP SIGNATURE-----





2.

                     ESB-2004.0133 -- RHSA-2004:064-01
             Updated samba packages fix security vulnerability
                             20 February 2004


Product:                Samba
Publisher:              Red Hat
Operating System:       Red Hat Enterprise Linux AS version 3
                        Red Hat Enterprise Linux ES version 3
                        Red Hat Enterprise Linux WS version 3
Impact:                 Increased Privileges
                        Access Privileged Data
Access Required:        Remote
CVE Names:              CAN-2004-0082

Ref:                    ESB-2004.0117

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated samba packages fix security vulnerability
Advisory ID:       RHSA-2004:064-01
Issue date:        2004-02-18
Updated on:        2004-02-18
Product:           Red Hat Enterprise Linux
Keywords:          smb
Cross references:  
Obsoletes:         
CVE Names:         CAN-2004-0082
- - ---------------------------------------------------------------------

1. Topic:

Updated Samba packages that fix a security vulnerability are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, ppc64, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - i386 Red
Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Samba provides file and printer sharing services to SMB/CIFS clients.

The Samba team discovered an issue that affects version 3.0.0 and 3.0.1 of Samba.  If an account for a user is created, but marked
as disabled using the mksmbpasswd script, it is possible for Samba to overwrite the user's password with the contents of an
uninitialized buffer.  This might lead to a disabled account becoming enabled with a password that could be guessed by an attacker.

Although this is likely to be a low risk issue for most Samba users, we have provided updated packages, which contain a backported
patch correcting this issue.

Red Hat would like to thank the Samba team for reporting this issue and providing us with a patch.

Note: Due to a packaging error in samba-3.0.0-14.3E, the winbind daemon is not automatically restarted when the Samba package is
upgraded.  After up2date has installed the samba-3.0.2-4.3E packages, you must run "/sbin/service winbind condrestart" as root to
restart the winbind daemon.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those RPMs which are currently installed will be updated.  Those
RPMs which are not installed but included in the list will not be updated.  Note that you can also use wildcards (*.rpm) if your
current directory *only* contains the desired RPMs.

Please note that this update is also available via Red Hat Network.  Many people find this an easier way to apply updates.  To use
Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

114995 - CAN-2004-0082 mksmbpasswd vulnerability

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/samba-3.0.2-6.3E.src.rpm

i386:
Available from Red Hat Network: samba-3.0.2-6.3E.i386.rpm Available from Red Hat Network: samba-client-3.0.2-6.3E.i386.rpm Available
from Red Hat Network: samba-common-3.0.2-6.3E.i386.rpm Available from Red Hat Network: samba-swat-3.0.2-6.3E.i386.rpm

ia64:
Available from Red Hat Network: samba-3.0.2-6.3E.ia64.rpm Available from Red Hat Network: samba-client-3.0.2-6.3E.ia64.rpm Available
from Red Hat Network: samba-common-3.0.2-6.3E.ia64.rpm Available from Red Hat Network: samba-swat-3.0.2-6.3E.ia64.rpm

ppc:
Available from Red Hat Network: samba-3.0.2-6.3E.ppc.rpm Available from Red Hat Network: samba-client-3.0.2-6.3E.ppc.rpm Available
from Red Hat Network: samba-common-3.0.2-6.3E.ppc.rpm Available from Red Hat Network: samba-swat-3.0.2-6.3E.ppc.rpm

ppc64:
Available from Red Hat Network: samba-3.0.2-6.3E.ppc64.rpm Available from Red Hat Network: samba-client-3.0.2-6.3E.ppc64.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.ppc64.rpm Available from Red Hat Network: samba-swat-3.0.2-6.3E.ppc64.rpm

s390:
Available from Red Hat Network: samba-3.0.2-6.3E.s390.rpm Available from Red Hat Network: samba-client-3.0.2-6.3E.s390.rpm Available
from Red Hat Network: samba-common-3.0.2-6.3E.s390.rpm Available from Red Hat Network: samba-swat-3.0.2-6.3E.s390.rpm

s390x:
Available from Red Hat Network: samba-3.0.2-6.3E.s390x.rpm Available from Red Hat Network: samba-client-3.0.2-6.3E.s390x.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.s390x.rpm Available from Red Hat Network: samba-swat-3.0.2-6.3E.s390x.rpm

x86_64:
Available from Red Hat Network: samba-3.0.2-6.3E.x86_64.rpm Available from Red Hat Network: samba-client-3.0.2-6.3E.x86_64.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.x86_64.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/samba-3.0.2-6.3E.src.rpm

i386:
Available from Red Hat Network: samba-3.0.2-6.3E.i386.rpm Available from Red Hat Network: samba-client-3.0.2-6.3E.i386.rpm Available
from Red Hat Network: samba-common-3.0.2-6.3E.i386.rpm Available from Red Hat Network: samba-swat-3.0.2-6.3E.i386.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/samba-3.0.2-6.3E.src.rpm

i386:
Available from Red Hat Network: samba-3.0.2-6.3E.i386.rpm Available from Red Hat Network: samba-client-3.0.2-6.3E.i386.rpm Available
from Red Hat Network: samba-common-3.0.2-6.3E.i386.rpm Available from Red Hat Network: samba-swat-3.0.2-6.3E.i386.rpm

ia64:
Available from Red Hat Network: samba-3.0.2-6.3E.ia64.rpm Available from Red Hat Network: samba-client-3.0.2-6.3E.ia64.rpm Available
from Red Hat Network: samba-common-3.0.2-6.3E.ia64.rpm Available from Red Hat Network: samba-swat-3.0.2-6.3E.ia64.rpm

x86_64:
Available from Red Hat Network: samba-3.0.2-6.3E.x86_64.rpm Available from Red Hat Network: samba-client-3.0.2-6.3E.x86_64.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.x86_64.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.x86_64.rpm



7. Verification:

MD5 sum                          Package Name
- - --------------------------------------------------------------------------

d80573d81d2e839ff95d6b2be63837be 3AS/en/os/SRPMS/samba-3.0.2-6.3E.src.rpm
4894f9fa9e46dfc0e4d59c27c569a4c2 3AS/en/os/i386/samba-3.0.2-6.3E.i386.rpm
95796c3368430ba3893551699f9c5834 3AS/en/os/i386/samba-client-3.0.2-6.3E.i386.rpm
2306521c559190833b067585ac315945 3AS/en/os/i386/samba-common-3.0.2-6.3E.i386.rpm
90b778d53802ab039c1f18fd0aa64083 3AS/en/os/i386/samba-swat-3.0.2-6.3E.i386.rpm
b80cddc956ed6f5ad59043366a41bc4f 3AS/en/os/ia64/samba-3.0.2-6.3E.ia64.rpm
a7c2f086eccd48ff31ab2b9c75a767f3 3AS/en/os/ia64/samba-client-3.0.2-6.3E.ia64.rpm
9610be71c8d32a75d989d2b528b96d18 3AS/en/os/ia64/samba-common-3.0.2-6.3E.ia64.rpm
a13f133ace1afad2a6921d8b9e1883af 3AS/en/os/ia64/samba-swat-3.0.2-6.3E.ia64.rpm
203365f82bb7992916661bdb1aeb857d 3AS/en/os/ppc/samba-3.0.2-6.3E.ppc.rpm
eb79808dbb47e491ff9d18defccda118 3AS/en/os/ppc/samba-client-3.0.2-6.3E.ppc.rpm
617b3c631fc76575af934245e6635f3d 3AS/en/os/ppc/samba-common-3.0.2-6.3E.ppc.rpm
391ba4ffc0fbc242b14facdec568a558 3AS/en/os/ppc/samba-swat-3.0.2-6.3E.ppc.rpm
24e48c200f963a688b098649a64a32bf 3AS/en/os/ppc64/samba-3.0.2-6.3E.ppc64.rpm
54f7dff06672a363999627643722fb50 3AS/en/os/ppc64/samba-client-3.0.2-6.3E.ppc64.rpm
d3786f261843e4ada797ae42bafbc9db 3AS/en/os/ppc64/samba-common-3.0.2-6.3E.ppc64.rpm
916bf4c08d8208998789f199e50c49c9 3AS/en/os/ppc64/samba-swat-3.0.2-6.3E.ppc64.rpm
43f9d50ff38ad6818276f958face9996 3AS/en/os/s390/samba-3.0.2-6.3E.s390.rpm
cc15a68397c220b763091f8c2da677d0 3AS/en/os/s390/samba-client-3.0.2-6.3E.s390.rpm
794f3e221a7e767248077ea33025a28d 3AS/en/os/s390/samba-common-3.0.2-6.3E.s390.rpm
766d56a66ee1e3ad920bc4af61784265 3AS/en/os/s390/samba-swat-3.0.2-6.3E.s390.rpm
2efbf724256045ca176310523163cdd5 3AS/en/os/s390x/samba-3.0.2-6.3E.s390x.rpm
1a47701428c8eacd7bf45603c8902e0a 3AS/en/os/s390x/samba-client-3.0.2-6.3E.s390x.rpm
8d22e6863316410073b26a295c19a769 3AS/en/os/s390x/samba-common-3.0.2-6.3E.s390x.rpm
6ba3fd33c327bf348910bb8042188a4e 3AS/en/os/s390x/samba-swat-3.0.2-6.3E.s390x.rpm
df382357df3280a33d9586025138d3a0 3AS/en/os/x86_64/samba-3.0.2-6.3E.x86_64.rpm
44e7c0335c0021d3a23f6102ebd3acb3 3AS/en/os/x86_64/samba-client-3.0.2-6.3E.x86_64.rpm
ee2ee02f6421e3d08ef9e75f9c5f7392 3AS/en/os/x86_64/samba-common-3.0.2-6.3E.x86_64.rpm
3cf5454d6c959e3fabcbaf74f69afc0f 3AS/en/os/x86_64/samba-swat-3.0.2-6.3E.x86_64.rpm
d80573d81d2e839ff95d6b2be63837be 3ES/en/os/SRPMS/samba-3.0.2-6.3E.src.rpm
4894f9fa9e46dfc0e4d59c27c569a4c2 3ES/en/os/i386/samba-3.0.2-6.3E.i386.rpm
95796c3368430ba3893551699f9c5834 3ES/en/os/i386/samba-client-3.0.2-6.3E.i386.rpm
2306521c559190833b067585ac315945 3ES/en/os/i386/samba-common-3.0.2-6.3E.i386.rpm
90b778d53802ab039c1f18fd0aa64083 3ES/en/os/i386/samba-swat-3.0.2-6.3E.i386.rpm
d80573d81d2e839ff95d6b2be63837be 3WS/en/os/SRPMS/samba-3.0.2-6.3E.src.rpm
4894f9fa9e46dfc0e4d59c27c569a4c2 3WS/en/os/i386/samba-3.0.2-6.3E.i386.rpm
95796c3368430ba3893551699f9c5834 3WS/en/os/i386/samba-client-3.0.2-6.3E.i386.rpm
2306521c559190833b067585ac315945 3WS/en/os/i386/samba-common-3.0.2-6.3E.i386.rpm
90b778d53802ab039c1f18fd0aa64083 3WS/en/os/i386/samba-swat-3.0.2-6.3E.i386.rpm
b80cddc956ed6f5ad59043366a41bc4f 3WS/en/os/ia64/samba-3.0.2-6.3E.ia64.rpm
a7c2f086eccd48ff31ab2b9c75a767f3 3WS/en/os/ia64/samba-client-3.0.2-6.3E.ia64.rpm
9610be71c8d32a75d989d2b528b96d18 3WS/en/os/ia64/samba-common-3.0.2-6.3E.ia64.rpm
a13f133ace1afad2a6921d8b9e1883af 3WS/en/os/ia64/samba-swat-3.0.2-6.3E.ia64.rpm
df382357df3280a33d9586025138d3a0 3WS/en/os/x86_64/samba-3.0.2-6.3E.x86_64.rpm
44e7c0335c0021d3a23f6102ebd3acb3 3WS/en/os/x86_64/samba-client-3.0.2-6.3E.x86_64.rpm
ee2ee02f6421e3d08ef9e75f9c5f7392 3WS/en/os/x86_64/samba-common-3.0.2-6.3E.x86_64.rpm
3cf5454d6c959e3fabcbaf74f69afc0f 3WS/en/os/x86_64/samba-swat-3.0.2-6.3E.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key is available from https://www.redhat.com/security/keys.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following
command:
    
    md5sum <filename>


8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0082

9. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact details at
https://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAM0AzXlSAg2UNWIIRArMcAJ9/8wwXhhP+g1igPs059WKP1a4tvACgwxZ1
9TgwQwl43MHBcXZD37NZ8j8=
=Dxv+
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------





3.


                     ESB-2004.0134 -- RHSA-2004:073-01
               Updated metamail packages fix vulnerabilities
                             20 February 2004


Product:                metamail
Publisher:              Red Hat
Operating System:       Red Hat Enterprise Linux AS (Advanced Server)
                        version 2.1
                        Red Hat Linux Advanced Workstation 2.1
                        Red Hat Enterprise Linux ES version 2.1
                        Red Hat Enterprise Linux WS version 2.1
Impact:                 Execute Arbitrary Code/Commands
Access Required:        Remote
CVE Names:              CAN-2004-0104 CAN-2004-0105

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated metamail packages fix vulnerabilities
Advisory ID:       RHSA-2004:073-01
Issue date:        2004-02-18
Updated on:        2004-02-18
Product:           Red Hat Enterprise Linux
Keywords:          
Cross references:  
Obsoletes:         
CVE Names:         CAN-2004-0104 CAN-2004-0105
- - ---------------------------------------------------------------------

1. Topic:

Updated metamail packages that fix a number of vulnerabilities are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat
Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386

3. Problem description:

Metamail is a system for handling multimedia mail.

Ulf Harnhammar discovered two integer overflow bugs and two buffer overflow bugs in versions of Metamail up to and including 2.7.
An attacker could create a carefully-crafted message such that when it is opened by a victim and parsed through Metamail, it runs
arbitrary code as the victim.  The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2004-0104
and CAN-2004-0105 to these issues.

Users of Red Hat Enterprise Linux 2.1 are advised to upgrade to these erratum packages, which contain a backported security patch
and are not vulnerable to these issues.  Please note that Red Hat Enterprise Linux 3 does not contain Metamail and is therefore not
vulnerable to these issues.

Red Hat would like to thank Ulf Harnhammar for the notification and patch for these issues.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those RPMs which are currently installed will be updated.  Those
RPMs which are not installed but included in the list will not be updated.  Note that you can also use wildcards (*.rpm) if your
current directory *only* contains the desired RPMs.

Please note that this update is also available via Red Hat Network.  Many people find this an easier way to apply updates.  To use
Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client
with an updated certificate.  The latest version of up2date is available from the Red Hat FTP site and may also be downloaded
directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

115804 - CAN-2004-0104/0105 Metamail vulnerabilities

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/metamail-2.7-29.src.rpm

i386:
Available from Red Hat Network: metamail-2.7-29.i386.rpm

ia64:
Available from Red Hat Network: metamail-2.7-29.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/metamail-2.7-29.src.rpm

ia64:
Available from Red Hat Network: metamail-2.7-29.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/metamail-2.7-29.src.rpm

i386:
Available from Red Hat Network: metamail-2.7-29.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/metamail-2.7-29.src.rpm

i386:
Available from Red Hat Network: metamail-2.7-29.i386.rpm



7. Verification:

MD5 sum                          Package Name
- - --------------------------------------------------------------------------

388b3a4bf5f803f0820c71509b8982e4 2.1AS/en/os/SRPMS/metamail-2.7-29.src.rpm
f556e3b720166ff08b8822ebbd0d563d 2.1AS/en/os/i386/metamail-2.7-29.i386.rpm
53eaa8eb8ef21233ba4124d095ce37c5 2.1AS/en/os/ia64/metamail-2.7-29.ia64.rpm
388b3a4bf5f803f0820c71509b8982e4 2.1AW/en/os/SRPMS/metamail-2.7-29.src.rpm
53eaa8eb8ef21233ba4124d095ce37c5 2.1AW/en/os/ia64/metamail-2.7-29.ia64.rpm
388b3a4bf5f803f0820c71509b8982e4 2.1ES/en/os/SRPMS/metamail-2.7-29.src.rpm
f556e3b720166ff08b8822ebbd0d563d 2.1ES/en/os/i386/metamail-2.7-29.i386.rpm
388b3a4bf5f803f0820c71509b8982e4 2.1WS/en/os/SRPMS/metamail-2.7-29.src.rpm
f556e3b720166ff08b8822ebbd0d563d 2.1WS/en/os/i386/metamail-2.7-29.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key is available from https://www.redhat.com/security/keys.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following
command:
    
    md5sum <filename>


8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0104
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0105

9. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact details at
https://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAM1TXXlSAg2UNWIIRAqZxAJ9p7pk6rzOBIyS7q7hT0rxRn9UZtwCfe2A3
k1ojTr65IOZK2tCBoftre10=
=FE3i





----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of RedHat for the information 
contained in this Briefing. 
----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
----------------------------------------------------------------------------------
<End of UNIRAS Briefing>