Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2005.0167 -- Debian Security Advisory DSA 685-1 New emacs21 packages fix arbitrary code execution 18 February 2005 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: emacs21 Publisher: Debian Operating System: Debian GNU/Linux 3.0 Linux variants UNIX variants Impact: Execute Arbitrary Code/Commands Access: Remote/Unauthenticated CVE Names: CAN-2005-0100 Ref: ESB-2005.0125 Original Bulletin: http://www.debian.org/security/2005/dsa-685 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 685-1 security@debian.org http://www.debian.org/security/ Martin Schulze February 17th, 2005 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : emacs21 Vulnerability : format string Problem-Type : remote Debian-specific: no CVE ID : CAN-2005-0100 Max Vozeler discovered several format string vulnerabilities in the movemail utility of Emacs, the well-known editor. Via connecting to a malicious POP server an attacker can execute arbitrary code under the privileges of group mail. For the stable distribution (woody) these problems have been fixed in version 21.2-1woody3. For the unstable distribution (sid) these problems have been fixed in version 21.3+1-9. We recommend that you upgrade your emacs packages. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3.dsc Size/MD5 checksum: 685 7b2d6f448bda83cde50bfbdac6af3c37 http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3.diff.gz Size/MD5 checksum: 60779 26c73195d7bc0ec32cb49d1a39c27cd9 http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2.orig.tar.gz Size/MD5 checksum: 24072376 3ac8d47ce8a61f2e585e6359efc53f07 Architecture independent components: http://security.debian.org/pool/updates/main/e/emacs21/emacs21-el_21.2-1woody3_all.deb Size/MD5 checksum: 7123990 91e9e9e5d2a36e5e69854c5207f9e03c Alpha architecture: http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3_alpha.deb Size/MD5 checksum: 13255430 dcbdbbdc5c2a226034477195f2c91ebf ARM architecture: http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3_arm.deb Size/MD5 checksum: 12886726 7498feec697be0a9a3dffd0cbec52429 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3_i386.deb Size/MD5 checksum: 12847064 98374f09bde9ed2c757d778f30cdee25 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3_ia64.deb Size/MD5 checksum: 13583480 aae0aa9e6e47818e99a21a11b79bfa5a HP Precision architecture: http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3_hppa.deb Size/MD5 checksum: 13095946 987acfbbf7cdd80b43c3d73ae9b448b1 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3_m68k.deb Size/MD5 checksum: 12777404 7d28afe74b5b742647053e5a7078307c Big endian MIPS architecture: http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3_mips.deb Size/MD5 checksum: 13076678 0dd0166bf19e0834a25e0da02cac7699 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3_mipsel.deb Size/MD5 checksum: 13032364 1518ecdaa0044ab33719c5cfb732f864 PowerPC architecture: http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3_powerpc.deb Size/MD5 checksum: 12929482 b00ec48f6b94043e23ae527316edbb02 IBM S/390 architecture: http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3_s390.deb Size/MD5 checksum: 12916492 1275283ccce7678b26914396baa466c1 Sun Sparc architecture: http://security.debian.org/pool/updates/main/e/emacs21/emacs21_21.2-1woody3_sparc.deb Size/MD5 checksum: 12962686 35e755cc4e619b8c200b9d14cffcf300 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCFIESW5ql+IAeqTIRAhvIAJ4gcnOvzb5jduYcfLY49mo5++r91wCfWqXB iN2lXxovHktw1wiUUbqQEkM= =lUPA - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQhU5hih9+71yA2DNAQIVuQP7BZOfLKw51p7MZ+oDPUqjC9Lpb6LTnHtQ foLLCaqsnLX0ZbOYeyFXiyOL2bd09JQ8664OCBGaVjs07/Qam+NbjkbBId3qOHRN bitU4M2UlDb4ZBIIj9dkBvazkgrltOIYESViN4nWhLkDxWEfvCpSd+GZjf54BwLC GnJeM6NbemU= =iP3v -----END PGP SIGNATURE-----