-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                       ESB-2007.0725 -- [UNIX/Linux]
                     [USN-519-1] elinks vulnerability
                             26 September 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              elinks
Publisher:            Ubuntu
Operating System:     UNIX variants (UNIX, Linux, OSX)
Impact:               Access Privileged Data
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-5034

Original Bulletin:    http://www.ubuntu.com/usn/usn-519-1

Comment: This advisory references vulnerabilities in products which run on
         platforms other than Ubuntu. It is recommended that administrators
         running elinks check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

=========================================================== 
Ubuntu Security Notice USN-519-1         September 25, 2007
elinks vulnerability
CVE-2007-5034
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  elinks                          0.10.6-1ubuntu3.2

Ubuntu 6.10:
  elinks                          0.11.1-1ubuntu2.2

Ubuntu 7.04:
  elinks                          0.11.1-1.2ubuntu2.2

In general, a standard system upgrade is sufficient to affect the
necessary changes.

Details follow:

Kalle Olavi Niemitalo discovered that if elinks makes a POST request
to an HTTPS URL through a proxy, information may be sent in clear-text
between elinks and the proxy.  Attackers with access to the network
could steal sensitive information (such as passwords).


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2.diff.gz
      Size/MD5:    31374 745db778d8da48d5bd8fd62313c299d9
    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2.dsc
      Size/MD5:      738 c0ea523a913d279a70c8a74ae91710be
    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6.orig.tar.gz
      Size/MD5:  3651428 0243203b9e54cf0cf002fca31244ce79

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_amd64.deb
      Size/MD5:   906814 2923d69aaad9fdf510f0778938a52890
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_amd64.deb
      Size/MD5:   732418 08d581518d511b015357b636b4b4bec2

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_i386.deb
      Size/MD5:   845344 b17b1d3b39e18b37244fa9803d727e28
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_i386.deb
      Size/MD5:   682980 7c5d2abc9e6be4a33d751cbeea3eacac

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_powerpc.deb
      Size/MD5:   889800 008c03be901b15f7245786b29c835712
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_powerpc.deb
      Size/MD5:   720926 d035afed6c4fefd680961719da376c66

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.10.6-1ubuntu3.2_sparc.deb
      Size/MD5:   862606 47b706af007c5e742d292975d2976d40
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.10.6-1ubuntu3.2_sparc.deb
      Size/MD5:   697554 6a69e45f969f2f9322c2e120b024cc59

Updated packages for Ubuntu 6.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2.diff.gz
      Size/MD5:    30804 7375454f7de82c81875704c8ace8fbfa
    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2.dsc
      Size/MD5:      747 ac4ab40f6c646071391977da8803c6a3
    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1.orig.tar.gz
      Size/MD5:  3863617 dce0fa7cb2b6e7194ddd00e34825218b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_amd64.deb
      Size/MD5:   663838 f01381b5e0c58a16def5bbe48400033d
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_amd64.deb
      Size/MD5:   460418 374d2e22edbaa346dec5f20d8959fbe3

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_i386.deb
      Size/MD5:   621490 8b7c70e58374453a00d9be6985287f6b
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_i386.deb
      Size/MD5:   418576 c46df44d6a25bd29f9e1030ac1736fc5

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_powerpc.deb
      Size/MD5:   656474 6a91b696b81c1498201610c53e475488
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_powerpc.deb
      Size/MD5:   453276 5490e3dccea1d7e4e9217b060eafdac7

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1ubuntu2.2_sparc.deb
      Size/MD5:   623180 88567da087d6bafc207e1c2ae36f00f9
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1ubuntu2.2_sparc.deb
      Size/MD5:   420738 a93466a63b8738442b9b7b8a8956d172

Updated packages for Ubuntu 7.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2.diff.gz
      Size/MD5:    30996 47f76e223281a4766374ad9bfd28b2b4
    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2.dsc
      Size/MD5:      835 04e6aa0377c01a16a342b0515f4ed67d
    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1.orig.tar.gz
      Size/MD5:  3863617 dce0fa7cb2b6e7194ddd00e34825218b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_amd64.deb
      Size/MD5:   667320 1ac7f9264a8116cfa941714ef2883baf
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_amd64.deb
      Size/MD5:   469024 4a9ed475d63bb65ff94b1e2e6cf4f22b

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_i386.deb
      Size/MD5:   625670 73987ab1453f8064741a48c1b1c29c3e
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_i386.deb
      Size/MD5:   425266 61137c1a5ed972040f2ce3866dbc4960

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_powerpc.deb
      Size/MD5:   665316 9322259cb40f15081498b34af26ccae4
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_powerpc.deb
      Size/MD5:   463014 b743d08aae093f63c2181f702a5ec810

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/e/elinks/elinks_0.11.1-1.2ubuntu2.2_sparc.deb
      Size/MD5:   631170 b163c245dadaadc10352694f741fe0d9
    http://security.ubuntu.com/ubuntu/pool/universe/e/elinks/elinks-lite_0.11.1-1.2ubuntu2.2_sparc.deb
      Size/MD5:   430040 ff48526da8dd46fd2e3c012756fa52de


- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRvnsnCh9+71yA2DNAQKe8AP+IOhyC4zntrjxtw6IjIFrl3YJrwGycyZI
NoYNMwYvOAG2wzaF+hNBoeNgPdr+Y58MZTsCZO9S60YWwwwwVvigT+GwDDXT7yi/
i/tzElDG6Lm6m9amoxq5SuuPR5xi5JDZnIAwuos36yb8mcW720CmKqa5zI/OjkKD
TaZN6AbtS/g=
=HjWE
-----END PGP SIGNATURE-----