-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
              AUSCERT External Security Bulletin Redistribution
                             
                      ESB-2000.362 -- RHSA-2000:110-06
     Updated joe packages are available for Red Hat Linux 5.2, 6.x and 7
                              22 November 2000

===========================================================================

	AusCERT Security Bulletin Summary
	---------------------------------

Product:                joe
Vendor:                 Red Hat
Operating System:       Red Hat Linux
                        Linux
Impact:                 Denial of Service

- --------------------------BEGIN INCLUDED TEXT--------------------

- ---------------------------------------------------------------------
                   Red Hat, Inc. Security Advisory

Synopsis:          Updated joe packages are available for Red Hat Linux 5.2, 6.x and 7
Advisory ID:       RHSA-2000:110-06
Issue date:        2000-11-17
Updated on:        2000-11-20
Product:           Red Hat Linux
Keywords:          joe DEADJOE symlink vulnerability
Cross references:  N/A
- ---------------------------------------------------------------------

1. Topic:

Updated joe packages are available for Red Hat Linux 5.2, 6.x and 7.

2. Relevant releases/architectures:

Red Hat Linux 5.2 - i386, alpha, sparc
Red Hat Linux 6.0 - i386, alpha, sparc
Red Hat Linux 6.1 - i386, alpha, sparc
Red Hat Linux 6.2 - i386, alpha, sparc
Red Hat Linux 6.2EE - i386
Red Hat Linux 7.0 - i386

3. Problem description:

When exiting joe in a nonstandard way (such as a system crash, closing an



xterm, or a network connection going down), joe will unconditionally append



its open  buffers to the file "DEADJOE". This could be exploited by the



creation of DEADJOE symlinks in directories where root would normally use



joe.  In this way, joe could be used to append garbage to



potentially-sensitive files, resulting in a denial of service.







Users of Red Hat Linux 6.x and 5.2 should also note that joe's



configuration files have been moved from /usr/lib/joe to /etc/joe

4. Solution:

For each RPM for your particular architecture, run:















rpm -Fvh [filename]















where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

N/A

6. RPMs required:

Red Hat Linux 5.2:

alpha:
ftp://updates.redhat.com/5.2/alpha/joe-2.8-42.52.alpha.rpm

sparc:
ftp://updates.redhat.com/5.2/sparc/joe-2.8-42.52.sparc.rpm

i386:
ftp://updates.redhat.com/5.2/i386/joe-2.8-42.52.i386.rpm

sources:
ftp://updates.redhat.com/5.2/SRPMS/joe-2.8-42.52.src.rpm

Red Hat Linux 6.0:

sparc:
ftp://updates.redhat.com/6.0/sparc/joe-2.8-42.62.sparc.rpm

i386:
ftp://updates.redhat.com/6.0/i386/joe-2.8-42.62.i386.rpm

alpha:
ftp://updates.redhat.com/6.0/alpha/joe-2.8-42.62.alpha.rpm

sources:
ftp://updates.redhat.com/6.0/SRPMS/joe-2.8-42.62.src.rpm

Red Hat Linux 6.1:

alpha:
ftp://updates.redhat.com/6.1/alpha/joe-2.8-42.62.alpha.rpm

sparc:
ftp://updates.redhat.com/6.1/sparc/joe-2.8-42.62.sparc.rpm

i386:
ftp://updates.redhat.com/6.1/i386/joe-2.8-42.62.i386.rpm

sources:
ftp://updates.redhat.com/6.1/SRPMS/joe-2.8-42.62.src.rpm

Red Hat Linux 6.2:

alpha:
ftp://updates.redhat.com/6.2/alpha/joe-2.8-42.62.alpha.rpm

sparc:
ftp://updates.redhat.com/6.2/sparc/joe-2.8-42.62.sparc.rpm

i386:
ftp://updates.redhat.com/6.2/i386/joe-2.8-42.62.i386.rpm

sources:
ftp://updates.redhat.com/6.2/SRPMS/joe-2.8-42.62.src.rpm

Red Hat Linux 7.0:

i386:
ftp://updates.redhat.com/7.0/i386/joe-2.8-43.i386.rpm

sources:
ftp://updates.redhat.com/7.0/SRPMS/joe-2.8-43.src.rpm

7. Verification:

MD5 sum                           Package Name
- --------------------------------------------------------------------------
7b78c81b253833ae849d162457d318dd  5.2/SRPMS/joe-2.8-42.52.src.rpm
0959bddd216c47426e5c335e6dbaa922  5.2/alpha/joe-2.8-42.52.alpha.rpm
d5dc1a23953544964c04ad1eaa9c1a26  5.2/i386/joe-2.8-42.52.i386.rpm
d5ce7e5469be6ff16373d4610c2b8fb3  5.2/sparc/joe-2.8-42.52.sparc.rpm
6eb2d2741296250f71667d5a1c1467fc  6.0/SRPMS/joe-2.8-42.62.src.rpm
c53a34db6539d412adc86493e17e9725  6.0/alpha/joe-2.8-42.62.alpha.rpm
d6afd50052ee0f5354a7398849d6c5b5  6.0/i386/joe-2.8-42.62.i386.rpm
0b1e58283c4f4d4c41c55948b0117f80  6.0/sparc/joe-2.8-42.62.sparc.rpm
6eb2d2741296250f71667d5a1c1467fc  6.1/SRPMS/joe-2.8-42.62.src.rpm
c53a34db6539d412adc86493e17e9725  6.1/alpha/joe-2.8-42.62.alpha.rpm
d6afd50052ee0f5354a7398849d6c5b5  6.1/i386/joe-2.8-42.62.i386.rpm
0b1e58283c4f4d4c41c55948b0117f80  6.1/sparc/joe-2.8-42.62.sparc.rpm
6eb2d2741296250f71667d5a1c1467fc  6.2/SRPMS/joe-2.8-42.62.src.rpm
c53a34db6539d412adc86493e17e9725  6.2/alpha/joe-2.8-42.62.alpha.rpm
d6afd50052ee0f5354a7398849d6c5b5  6.2/i386/joe-2.8-42.62.i386.rpm
0b1e58283c4f4d4c41c55948b0117f80  6.2/sparc/joe-2.8-42.62.sparc.rpm
67e2ddb6f4c903672782467684fbb7d3  7.0/SRPMS/joe-2.8-43.src.rpm
1578b0e184b76b23d2a30b101f1665d4  7.0/i386/joe-2.8-43.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:

N/A


Copyright(c) 2000 Red Hat, Inc.

- --------------------------END INCLUDED TEXT--------------------

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBOlSNSyh9+71yA2DNAQGBLAP/fHnD9dba01cOea3L2pzRtsUcveVQrBNp
20so994hxxJ8Kog5LYIvS5zH9z98wPBOAG9KmNQ3OSIyUxGVSFU7/ukDka8ENWW+
/Vmo9AcPGW1/lQVJ1LNOMZjydSIKJYR28ZlmNAhiqP7t9zpz4MhDd2/R+62/BcCK
6/zzYZsyTwI=
=WlWr
-----END PGP SIGNATURE-----