[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 600/05 - Red Hat - dump (RHSA-2005:583-01); SquirrelMail (RHSA-2005:595-01)



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 600/05 dated 04.08.05  Time: 09:53
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====
Red Hat Security Advisories
dump security update - RHSA-2005:583-01
SquirrelMail security update - RHSA-2005:595-01

Detail
====== 

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: dump security update
Advisory ID:       RHSA-2005:583-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-583.html
Issue date:        2005-08-03
Updated on:        2005-08-03
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2002-1914
- - ---------------------------------------------------------------------

1. Summary:

Updated dump packages that address two security issues are now available
for Red Hat Enterprise Linux 2.1.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386

3. Problem description:

Dump examines files in a file system, determines which ones need to be
backed up, and copies those files to a specified disk, tape, or other
storage medium.

A flaw was found with dump file locking.  A malicious local user could 
manipulate the file lock in such a way as to prevent dump from running.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CAN-2002-1914 to this issue.

Users of dump should upgrade to these erratum packages, which contain a
patch to resolve this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

162903 - CAN-2002-1914 dump denial of service


6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/dump-0.4b25-1.72.2.src.rpm
a2105338ff2279973bcec74ea8dd96dd  dump-0.4b25-1.72.2.src.rpm

i386:
b14ad2aef495fd52b2bfa8501147a86c  dump-0.4b25-1.72.2.i386.rpm
1d658c6130d9b317456b56b6e21acd42  rmt-0.4b25-1.72.2.i386.rpm

ia64:
ace0b517d6b4d26fdfc40744368053cd  dump-0.4b25-1.72.2.ia64.rpm
f6ed788f99e81abdde859cbb4dabe1fb  rmt-0.4b25-1.72.2.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/dump-0.4b25-1.72.2.src.rpm
a2105338ff2279973bcec74ea8dd96dd  dump-0.4b25-1.72.2.src.rpm

ia64:
ace0b517d6b4d26fdfc40744368053cd  dump-0.4b25-1.72.2.ia64.rpm
f6ed788f99e81abdde859cbb4dabe1fb  rmt-0.4b25-1.72.2.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/dump-0.4b25-1.72.2.src.rpm
a2105338ff2279973bcec74ea8dd96dd  dump-0.4b25-1.72.2.src.rpm

i386:
b14ad2aef495fd52b2bfa8501147a86c  dump-0.4b25-1.72.2.i386.rpm
1d658c6130d9b317456b56b6e21acd42  rmt-0.4b25-1.72.2.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/dump-0.4b25-1.72.2.src.rpm
a2105338ff2279973bcec74ea8dd96dd  dump-0.4b25-1.72.2.src.rpm

i386:
b14ad2aef495fd52b2bfa8501147a86c  dump-0.4b25-1.72.2.i386.rpm
1d658c6130d9b317456b56b6e21acd42  rmt-0.4b25-1.72.2.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://marc.theaimsgroup.com/?l=bugtraq&m=102701096228027
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1914

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFC8NKEXlSAg2UNWIIRAq/2AKCPo/D5qz0OYg676/LC6om5HdNqSQCePbG1
HcvBRJT3mapjTOgxhvmVFEg=
=yZqd
- -----END PGP SIGNATURE-----


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: SquirrelMail security update
Advisory ID:       RHSA-2005:595-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-595.html
Issue date:        2005-08-03
Updated on:        2005-08-03
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-2095 CAN-2005-1769
- - ---------------------------------------------------------------------

1. Summary:

An updated squirrelmail package that fixes two security issues is now
available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - noarch
Red Hat Desktop version 3 - noarch
Red Hat Enterprise Linux ES version 3 - noarch
Red Hat Enterprise Linux WS version 3 - noarch
Red Hat Enterprise Linux AS version 4 - noarch
Red Hat Enterprise Linux Desktop version 4 - noarch
Red Hat Enterprise Linux ES version 4 - noarch
Red Hat Enterprise Linux WS version 4 - noarch

3. Problem description:

SquirrelMail is a standards-based webmail package written in PHP4.

A bug was found in the way SquirrelMail handled the $_POST variable. A
user's SquirrelMail preferences could be read or modified if the user is
tricked into visiting a malicious URL. The Common Vulnerabilities and
Exposures project assigned the name CAN-2005-2095 to this issue.

Several cross-site scripting bugs were discovered in SquirrelMail. An
attacker could inject arbitrary Javascript or HTML content into
SquirrelMail pages by tricking a user into visiting a carefully crafted
URL, or by sending them a carefully constructed HTML email message. 
(CAN-2005-1769)

All users of SquirrelMail should upgrade to this updated package, which
contains backported patches that resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

Additionally, users will have to bring up the "Network Proxy" dialog and
reset their keys for the settings to take place.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

160241 - CAN-2005-1769 Multiple XSS issues in squirrelmail
162275 - CAN-2005-2095 squirrelmail cross site posting issue


6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/squirrelmail-1.4.3a-10.EL3.src.rpm
ba88d8cade37412c5abda4e5c4660b18  squirrelmail-1.4.3a-10.EL3.src.rpm

noarch:
78615d9edfaa42e09f81267778e121ed  squirrelmail-1.4.3a-10.EL3.noarch.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/squirrelmail-1.4.3a-10.EL3.src.rpm
ba88d8cade37412c5abda4e5c4660b18  squirrelmail-1.4.3a-10.EL3.src.rpm

noarch:
78615d9edfaa42e09f81267778e121ed  squirrelmail-1.4.3a-10.EL3.noarch.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/squirrelmail-1.4.3a-10.EL3.src.rpm
ba88d8cade37412c5abda4e5c4660b18  squirrelmail-1.4.3a-10.EL3.src.rpm

noarch:
78615d9edfaa42e09f81267778e121ed  squirrelmail-1.4.3a-10.EL3.noarch.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/squirrelmail-1.4.3a-10.EL3.src.rpm
ba88d8cade37412c5abda4e5c4660b18  squirrelmail-1.4.3a-10.EL3.src.rpm

noarch:
78615d9edfaa42e09f81267778e121ed  squirrelmail-1.4.3a-10.EL3.noarch.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/squirrelmail-1.4.3a-11.EL4.src.rpm
4abd471bd12dce975d68297c2a82837f  squirrelmail-1.4.3a-11.EL4.src.rpm

noarch:
b19badf585b022e32acd1a546b624e1b  squirrelmail-1.4.3a-11.EL4.noarch.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/squirrelmail-1.4.3a-11.EL4.src.rpm
4abd471bd12dce975d68297c2a82837f  squirrelmail-1.4.3a-11.EL4.src.rpm

noarch:
b19badf585b022e32acd1a546b624e1b  squirrelmail-1.4.3a-11.EL4.noarch.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/squirrelmail-1.4.3a-11.EL4.src.rpm
4abd471bd12dce975d68297c2a82837f  squirrelmail-1.4.3a-11.EL4.src.rpm

noarch:
b19badf585b022e32acd1a546b624e1b  squirrelmail-1.4.3a-11.EL4.noarch.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/squirrelmail-1.4.3a-11.EL4.src.rpm
4abd471bd12dce975d68297c2a82837f  squirrelmail-1.4.3a-11.EL4.src.rpm

noarch:
b19badf585b022e32acd1a546b624e1b  squirrelmail-1.4.3a-11.EL4.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1769

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFC8NKhXlSAg2UNWIIRAhiIAJ93pFUqnzs4hgL8ifFab+OCBV8sFACffwNh
kwGNzkAf41IVMhsGqiYX7F4=
=wa0R
- -----END PGP SIGNATURE-----

- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 870 487 0748 Ext 4511
Fax: +44 (0) 870 487 0749

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 870 487 0748 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Red Hat, Inc. for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>




-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQCVAwUBQvHXt4pao72zK539AQEZ7AP/cG+OUbFB+0b1YFt42Pe8C09fEwOF14l2
Cav0WQwh7UGf0CtuHjRMnUCo5HjCPLgWFkX2CzLXMNBwZEH6b8DGpJCgiNmOOuOe
vkbn7K3Qikx1+M655ldBtHK2XIb+d2FzATGlnp8vRutBgmG6fGZxEOLVYeXA/Vg/
jLNR0Nz7yc8=
=hjA8
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________