Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2005.0900 -- Debian Security Advisory DSA 889-1 New enigmail packages fix information disclosure 9 November 2005 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: enigmail Publisher: Debian Operating System: Debian GNU/Linux 3.1 UNIX variants Windows Impact: Access Confidential Data Access: Remote/Unauthenticated CVE Names: CAN-2005-3256 Original Bulletin: http://www.debian.org/security/2005/dsa-889 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running enigmail check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 889-1 security@debian.org http://www.debian.org/security/ Martin Schulze November 8th, 2005 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : enigmail Vulnerability : programming error Problem type : local (remote) Debian-specific: no CVE ID : CAN-2005-3256 CERT advisory : VU#805121 Debian Bug : 335731 A bug has been discovered in enigmail, GPG support for Mozilla MailNews and Mozilla Thunderbird, that can lead to the encryption of mail with the wrong public key, hence, potential disclosure of confidential data to others. The old stable distribution (woody) does not contain enigmail packages. For the stable distribution (sarge) this problem has been fixed in version 0.91-4sarge2. For the unstable distribution (sid) this problem has been fixed in version 0.93-1. We recommend that you upgrade your enigmail packages. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/e/enigmail/enigmail_0.91-4sarge2.dsc Size/MD5 checksum: 876 75a0758ff71b8651e26cb3d16320cb04 http://security.debian.org/pool/updates/main/e/enigmail/enigmail_0.91-4sarge2.diff.gz Size/MD5 checksum: 17190 9d19e21a4feaf5177216646635949398 http://security.debian.org/pool/updates/main/e/enigmail/enigmail_0.91.orig.tar.gz Size/MD5 checksum: 2027147 b802d62ea602d82d8d0c69cc807bf83a Alpha architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_alpha.deb Size/MD5 checksum: 345752 818ab632bcb4ea7e8b4105086aa2b904 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_alpha.deb Size/MD5 checksum: 350004 5087cf1624f2d70c5f0a543604556596 AMD64 architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_amd64.deb Size/MD5 checksum: 314392 f9f5d14e6e0d000cfc3394ecdd6115d7 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_amd64.deb Size/MD5 checksum: 318672 d9fe5cf1c8c747e2c750f4687115f735 ARM architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_arm.deb Size/MD5 checksum: 301182 0f7100552d152f8018726349de1bade3 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_arm.deb Size/MD5 checksum: 306332 cd5027429531a8c3b87d9a2c5e8aaaab Intel IA-32 architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_i386.deb Size/MD5 checksum: 298752 1ab5eee62ddb846a74441bc50d0120cf http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_i386.deb Size/MD5 checksum: 304076 eb8586436db24bf342f69b1d3996c37e Intel IA-64 architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_ia64.deb Size/MD5 checksum: 360432 cff589e212e6852048c65121be50e06c http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_ia64.deb Size/MD5 checksum: 365434 f5571495756e2b8a72bf609bf2e73824 HP Precision architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_hppa.deb Size/MD5 checksum: 321090 c2038c3d7274addf7387790275d668a1 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_hppa.deb Size/MD5 checksum: 325354 c285ed213fc3a9cc62bbe2c0ac84ca2e Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_m68k.deb Size/MD5 checksum: 299930 6f45c5101ae36faa4bef8f4bfb5dedaa http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_m68k.deb Size/MD5 checksum: 305212 aade8a0d36c5205034c845fa803c230f Big endian MIPS architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_mips.deb Size/MD5 checksum: 308046 11eec39a832de3fe90794a5958044678 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_mips.deb Size/MD5 checksum: 313148 358aa614e2b4fb330a162b6bdd8a19b7 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_mipsel.deb Size/MD5 checksum: 307274 5fa7f930926d0fdf8e60d86eda6c6579 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_mipsel.deb Size/MD5 checksum: 312344 98db4ceb10b7848d8e58c83a8a02e968 PowerPC architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_powerpc.deb Size/MD5 checksum: 300700 ee25b159b35a02b6d1e5f45212d6dae7 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_powerpc.deb Size/MD5 checksum: 305824 6fbe747eb1eb09f56e634c6f9f21cef8 IBM S/390 architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_s390.deb Size/MD5 checksum: 322512 1dbfe3be09e79091a5f01ae7f0b251a2 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_s390.deb Size/MD5 checksum: 327176 a3a75f4c3782ed0e6e7fdb881e753661 Sun Sparc architecture: http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_sparc.deb Size/MD5 checksum: 299788 009c91ff056a4b6a3bf9adc5a3425335 http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_sparc.deb Size/MD5 checksum: 304074 a6fb00b36e7d52d91a136327928338c9 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDcElDW5ql+IAeqTIRAvhiAKCWBcDVjwjI7fsMUdGWzR+v7r4R+wCfVbr1 62hrrDtJEhQT9SzSOaGVuJo= =Q5yZ - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQ3FAkyh9+71yA2DNAQKUqQP/di/K9dw0WKIcLYNrCtvRqomaDik05hNJ WhRgqiSM5dg0q1oHkUDNKXOJ0FzLVBoCrJVJCJK57vGLWEkjM6TBkLBIVbUBc0CP 1blm+ct+5O1oDZ4BnFb/+YaGbruQ5fKbXAX1W/BQ3P7nSM6i+WuNiYBjA2JVCV5I H3Y7JKxg+Xw= =0eM9 -----END PGP SIGNATURE-----