-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2005.0785 -- Debian Security Advisory DSA 848-1
             New masqmail packages fix several vulnerabilities
                              10 October 2005

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           masqmail
Publisher:         Debian
Operating System:  Debian GNU/Linux 3.1
                   Debian GNU/Linux 3.0
                   Linux variants
                   BSD variants
Impact:            Execute Arbitrary Code/Commands
                   Overwrite Arbitrary Files
Access:            Existing Account
CVE Names:         CAN-2005-2663 CAN-2005-2662

Original Bulletin: http://www.debian.org/security/2005/dsa-848

Comment: This advisory references vulnerabilities in products which run on
         platforms other than Debian. It is recommended that administrators
         running MasqMail check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA 848-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
October 8th, 2005                       http://www.debian.org/security/faq
- - --------------------------------------------------------------------------

Package        : masqmail
Vulnerability  : several
Problem type   : local
Debian-specific: no
CVE ID         : CAN-2005-2662 CAN-2005-2663

Jens Steube discovered two vulnerabilities in masqmail, a mailer for
hosts without permanent internet connection.  The Common
Vulnerabilities and Exposures project identifies the following
problems:

CAN-2005-2662

    When sending failed mail messages, the address is not sanitised,
    which allows a local attacker to execute arbitrary commands as the
    mail user.

CAN-2005-2663

    When opening the log file, masqmail does not relinquish
    privileges, which allows a local attacker to overwrite arbitrary
    files via a symlink attack.

For the old stable distribution (woody) these problems have been fixed in
version 0.1.16-2.2.

For the stable distribution (sarge) these problems have been fixed in
version 0.2.20-1sarge1.

For the unstable distribution (sid) these problems have been fixed in
version 0.2.20-1sarge1.

We recommend that you upgrade your masqmail package.


Upgrade Instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2.dsc
      Size/MD5 checksum:      616 c8e56189f4776243e9ac8216fe96eca9
    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2.diff.gz
      Size/MD5 checksum:    10607 fede79dec7ac68712cd6ca66ecd11b95
    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16.orig.tar.gz
      Size/MD5 checksum:   174634 0e391fd2d56d61b0a879f3c37b9e068d

  Alpha architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_alpha.deb
      Size/MD5 checksum:   103730 9c5b4acb97b0ee7e2f0f5e0d7eb41f0d

  ARM architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_arm.deb
      Size/MD5 checksum:    90844 c9d4a0931baa6dc4ff2b600768bbea87

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_i386.deb
      Size/MD5 checksum:    88450 f384d634c4148d2a8349fbfa68aeaa03

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_ia64.deb
      Size/MD5 checksum:   123742 2a3274281a32af576661b35d3f6460d2

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_hppa.deb
      Size/MD5 checksum:    99124 efd80fc98022573d9b7c4ca59458bce4

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_m68k.deb
      Size/MD5 checksum:    86290 584bd580fa155e0e7de620fcbe475781

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_mips.deb
      Size/MD5 checksum:    97430 cfd5b01c3cea7a26114fa8ed823f2b36

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_mipsel.deb
      Size/MD5 checksum:    97608 4bf6407d3799514f1a64428be64e1703

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_powerpc.deb
      Size/MD5 checksum:    92066 11278851463d715a78dd427c885d6c71

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_s390.deb
      Size/MD5 checksum:    91252 41a3393aa6c556af480a0091f4859b3a

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.1.16-2.2_sparc.deb
      Size/MD5 checksum:    92774 1e13a66f9a0e338304141d446c6a44c3


Debian GNU/Linux 3.1 alias sarge
- - --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1.dsc
      Size/MD5 checksum:      553 071de088ea2cf173f7df397f5b9a2e00
    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1.tar.gz
      Size/MD5 checksum:   243780 38ab6b58d99e93b6688ae958d92c0f3c

  Alpha architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_alpha.deb
      Size/MD5 checksum:   143574 4a0e11af8b79ddb53e84f3e8f3e7d0e9

  ARM architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_arm.deb
      Size/MD5 checksum:   121910 6c020669757396b5b9c959b5683228da

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_i386.deb
      Size/MD5 checksum:   122054 696d177b8524e13a0de5da6be97a3c70

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_ia64.deb
      Size/MD5 checksum:   162460 fffa1b99ace83cb1fbd55f93437e2132

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_hppa.deb
      Size/MD5 checksum:   131458 d0e0424020639e6971168d900ace0eb2

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_m68k.deb
      Size/MD5 checksum:   116914 a7ff06c51610f661e28166007a5ff835

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_mips.deb
      Size/MD5 checksum:   132456 b51be0307d9498a5093343326e556957

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_mipsel.deb
      Size/MD5 checksum:   132794 59a7ee664a2721b43b5b97dbb7462bc8

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_powerpc.deb
      Size/MD5 checksum:   131814 2298b05e9090956e9d977f96dfb470a2

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_s390.deb
      Size/MD5 checksum:   129204 1c022f2ca6ff2b707b7412fb6cebe4a0

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/masqmail/masqmail_0.2.20-1sarge1_sparc.deb
      Size/MD5 checksum:   122814 17e02dac3320ea6e4625fadad6e5a1e8


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDR36XW5ql+IAeqTIRAk0LAJ9pf0c+m3A4qGuijt7vE8+2UdhzcQCfQY/b
PEzAZ+JL3Hc1sAZMI6udViY=
=CF7i
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQ0mzKCh9+71yA2DNAQLS9gP6AyVhNZM6Be+Ecq6MNgJFwlGWjg19axQm
ydh6fPv1jurHaafnH5XH1iS8eaRuD1WFMzW2ukFUAkXeUp7VcteZWKVzJ9Mmngpk
/ptkJP1vyAu0/jpDO1/QEfDHYTuEK3+X4Qe8ZHdlylE1x1+9j/QLXop/jL4ZeJCa
EIodIbuPF58=
=3+0H
-----END PGP SIGNATURE-----