Date: 09 December 2005
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2005.0975 -- [UNIX/Linux][Debian]
New osh packages fix privilege escalation
9 December 2005
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: osh
Publisher: Debian
Operating System: Debian GNU/Linux 3.1
Debian GNU/Linux 3.1
UNIX variants (UNIX, Linux, OSX)
Impact: Root Compromise
Access: Existing Account
CVE Names: CVE-2005-3533 CVE-2005-3347
Original Bulletin: http://www.debian.org/security/2005/dsa-918
Comment: This advisory references vulnerabilities in products which run on
platforms other than Debian. It is recommended that administrators
running osh check for an updated version of the software for
their operating system.
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - --------------------------------------------------------------------------
Debian Security Advisory DSA 918-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
December 9th, 2005 http://www.debian.org/security/faq
- - --------------------------------------------------------------------------
Package : osh
Vulnerability : programming error
Problem type : local
Debian-specific: no
CVE ID : CVE-2005-3347 CVE-2005-3533
Debian Bug : 338312
Several security related problems have been discovered in osh, the
operator's shell for executing defined programs in a privileged
environment. The Common Vulnerabilities and Exposures project
identifies the following vulnerabilities:
CVE-2005-3347
Charles Stevenson discovered a bug in the substitution of
variables that allows a local attacker to open a root shell.
CVE-2005-3533
Solar Eclipse discovered a buffer overflow caused by the current
working directory plus a filename that could be used to execute
arbitrary code and e.g. open a root shell.
For the old stable distribution (woody) these problems have been fixed in
version 1.7-11woody2.
For the stable distribution (sarge) these problems have been fixed in
version 1.7-13sarge1.
For the unstable distribution (sid) these problems have been fixed in
version 1.7-15, however, the package has been removed entirely.
We recommend that you upgrade your osh package.
Upgrade Instructions
- - --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- - --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2.dsc
Size/MD5 checksum: 565 6341a0b49e77066cf3645e3abfe98653
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2.diff.gz
Size/MD5 checksum: 12578 7276b78763b4033448f2903d0cf64e96
http://security.debian.org/pool/updates/main/o/osh/osh_1.7.orig.tar.gz
Size/MD5 checksum: 150241 0196364c5ea0afab1c1d3163c40cb1a8
Alpha architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_alpha.deb
Size/MD5 checksum: 32426 c41a8e928125f048778eeaecda51c58a
ARM architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_arm.deb
Size/MD5 checksum: 27402 fa9fdba7af436e4b7a1ac1d99657e9ce
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_i386.deb
Size/MD5 checksum: 27084 47d99052863f6ac5ad44c794e399bc43
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_ia64.deb
Size/MD5 checksum: 36942 b0b3631235a76fff6841ab7a7c1ce1d6
HP Precision architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_hppa.deb
Size/MD5 checksum: 29366 7684c38b177294c6f8c647e4ad5c7ce8
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_m68k.deb
Size/MD5 checksum: 26338 cf9c3511eb73cfdf5861966130354246
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_mips.deb
Size/MD5 checksum: 29510 d443160b8e72c36d30ce3f7fa5ae6178
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_mipsel.deb
Size/MD5 checksum: 29468 745f79348790bda9accb5250a40520f1
PowerPC architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_powerpc.deb
Size/MD5 checksum: 28816 7f387b8bc51460e94c1e0ca562906e2f
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_s390.deb
Size/MD5 checksum: 28294 60e0010eb4e3fe1007e1c4c3bf082c44
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody2_sparc.deb
Size/MD5 checksum: 30894 60969c49d4be186b8000af6532393335
Debian GNU/Linux 3.1 alias sarge
- - --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1.dsc
Size/MD5 checksum: 565 71ea00a2e13ea67b337d450a77cea49a
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1.diff.gz
Size/MD5 checksum: 12818 5df9ac8705fd85dc8ad07a74a470ba77
http://security.debian.org/pool/updates/main/o/osh/osh_1.7.orig.tar.gz
Size/MD5 checksum: 150241 0196364c5ea0afab1c1d3163c40cb1a8
Alpha architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_alpha.deb
Size/MD5 checksum: 31468 767b6efad96e1e49f584d36eb502c5cc
AMD64 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_amd64.deb
Size/MD5 checksum: 29360 496db05c70e81a7314382389826bb2a1
ARM architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_arm.deb
Size/MD5 checksum: 27712 578e45cadbb18d9ccc137494a3d1938d
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_i386.deb
Size/MD5 checksum: 27846 3be55b13083630d6fc4fbc4892f4be99
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_ia64.deb
Size/MD5 checksum: 35320 8849f5286f65d67ccfa2a25e4007f39f
HP Precision architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_hppa.deb
Size/MD5 checksum: 29650 1fcfede379bc4ee5474602ed8decd4da
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_m68k.deb
Size/MD5 checksum: 27094 d8af0990d6017e61cb63b025f77930c6
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_mips.deb
Size/MD5 checksum: 29824 b80543697d548c0ef3cf729685db249b
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_mipsel.deb
Size/MD5 checksum: 29838 2c18ef4a3d1243fd92f0d196b7a9d8c9
PowerPC architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_powerpc.deb
Size/MD5 checksum: 30432 71a1b2e26d896852efd7e29be68f1048
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_s390.deb
Size/MD5 checksum: 29526 c20605b6cef6b680ab4deade9651cf16
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-13sarge1_sparc.deb
Size/MD5 checksum: 28032 ad94a0fc87d2f681ef2fcbf536269f71
These files will probably be moved into the stable distribution on
its next update.
- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFDmRxhW5ql+IAeqTIRApnQAJ92l9sfCMIuTl2++lo6bdK3AP7kmACgjBLo
qOhGIg+sa6o/82/LRQQRMHA=
=VyE2
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBQ5kk3Sh9+71yA2DNAQL5QwP/bk0jJcjOoHaz+MWZcrQ7n7YhnTsAcBQ6
tcRvztT+dADUcCZDGQGXUHaEpmxZw9lQgWhJ9dSF3Ep5i3WaypMxxmb+vQkjv/2F
NsojuvYw1cuQv9aaS8WvQk+nisyJd49jvzrPIkQT1pNMkzllIc5gh8U5HrwEF7dF
S/XagdwrsXI=
=jyhf
-----END PGP SIGNATURE-----
|