-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2003.0305 -- Debian Security Advisory DSA 292-2
       New mime-support packages fix temporary file race conditions
                               24 April 2003

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                mime-support
Vendor:                 Debian
Operating System:       Debian GNU/Linux 3.0
                        Debian GNU/Linux 2.2
                        Linux
Impact:                 Overwrite Arbitrary Files
                        Increased Privileges
Access Required:        Existing Account

Ref:                    ESB-2003.0303

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 292-2                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
April 23rd, 2003                        http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : mime-support
Vulnerability  : insecure temporary file creation
Problem-Type   : local
Debian-specific: no

Unfortunately yesterday's update for mime-support did not exactly work
as expected, which requires an update.  For completeness we include
the advisory text:

  Colin Phipps discovered several problems in mime-support, that contains
  support programs for the MIME control files 'mime.types' and 'mailcap'.
  When a temporary file is to be used it is created insecurely, allowing
  an attacker to overwrite arbitrary under the user id of the person
  executing run-mailcap, most probably root.  Additionally the program did
  not properly escape shell escape characters when executing a command.
  This is unlikely to be exploitable, though.

For the stable distribution (woody) these problems have been fixed in
version 3.18-1.2.

For the old stable distribution (potato) these problems have been
fixed in version 3.9-1.2.

For the unstable distribution (sid) these problems have been
fixed in version 3.22-1 (same as DSA 292-1).

We recommend that you upgrade your mime-support packages.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
- - ---------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/mime-support/mime-support_3.9-1.2.dsc
      Size/MD5 checksum:      473 aee5059f79f23a3a87bae000d4be1d3e
    http://security.debian.org/pool/updates/main/m/mime-support/mime-support_3.9-1.2.tar.gz
      Size/MD5 checksum:    91752 65c98a8e86529662af082682eca108ae

  Architecture independent components:

    http://security.debian.org/pool/updates/main/m/mime-support/mime-support_3.9-1.2_all.deb
      Size/MD5 checksum:    99198 97ca84b5ade9137cbba38fc05a14bdff


Debian GNU/Linux 3.0 alias woody
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/mime-support/mime-support_3.18-1.2.dsc
      Size/MD5 checksum:      475 7a83acdfcdcb2a128ebc2de347ad51c8
    http://security.debian.org/pool/updates/main/m/mime-support/mime-support_3.18-1.2.tar.gz
      Size/MD5 checksum:    72215 df544f4173db71ddbead9c61a8e9b3b5

  Architecture independent components:

    http://security.debian.org/pool/updates/main/m/mime-support/mime-support_3.18-1.2_all.deb


  These files will probably be moved into the stable distribution on
  its next revision.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+ppm/W5ql+IAeqTIRArbdAJ4v9nd483StCTS9bHakSe0N49/0PgCeJ3x/
mNVjE67noT4KK9B+pp2KMeY=
=mLz7
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBPqfiCih9+71yA2DNAQG8pQQAgzPdBiNFxL3iHJdnP+/znTybFlgM3Pfa
/Maumqg5MSdoq8STP5QAjZDV5skaj7ExOF9VgBRq6CgBAcvslM5w79mnWBpDHlV1
i19Bu32FkqgBGncgnQV7b9OezGz8j+R+h2qM9TFpEDCtS7dTi2lZZpg/2jKDJGec
9W1qFAPZMII=
=I+H0
-----END PGP SIGNATURE-----