----- Forwarded message from [EMAIL PROTECTED] -----

> From: [EMAIL PROTECTED]
> Reply-To: [EMAIL PROTECTED]
> Date:         Tue, 8 Aug 2000 10:20:00 -0400
> To: [EMAIL PROTECTED]
> Subject:      [RHSA-2000:048-02] Updated mailx and perl packages are now
>               available.
> 
> ---------------------------------------------------------------------
>                    Red Hat, Inc. Security Advisory
> 
> Synopsis:          Updated mailx and perl packages are now available.
> Advisory ID:       RHSA-2000:048-02
> Issue date:        2000-08-07
> Updated on:        2000-08-08
> Product:           Red Hat Linux
> Keywords:          perl suid
> Cross references:  N/A
> ---------------------------------------------------------------------
> 
> 1. Topic:
> 
> Updated perl and mailx package are now available which fix a potential
> exploit made possible by incorrect assumptions made in suidperl.
> 
> 2. Relevant releases/architectures:
> 
> Red Hat Linux 5.0 - i386, alpha, sparc
> Red Hat Linux 5.1 - i386, alpha, sparc
> Red Hat Linux 5.2 - i386, alpha, sparc
> Red Hat Linux 6.0 - i386, alpha, sparc
> Red Hat Linux 6.1 - i386, alpha, sparc
> Red Hat Linux 6.2 - i386, alpha, sparc
> Red Hat Linux 6.2E - i386, alpha, sparc
> 
> 3. Problem description:
> 
> Under certain conditions, suidperl will attempt to send mail to the local
> superuser account using /bin/mail.  A properly formatted exploit script can
> use this facility, along with mailx's tendency to inherit settings from the
> environment, to gain local root access.
> 
> This update changes suidperl's behavior to use syslog instead of mail, and
> restricts the list of variables /bin/mail will read from the environment.
> 
> 4. Solution:
> 
> For each RPM for your particular architecture, run:
> 
> rpm -Fvh [filename]
> 
> where filename is the name of the RPM.
> 
> 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
> 
> 15625 - Root exploit alread posted on bugtraq
> 15630 - Root exploit in sperl
> 15641 - suidperl has a major problem
> 
> 
> 6. RPMs required:
> 
> Red Hat Linux 5.0, 5.1, 5.2:
> 
> sparc:
> ftp://updates.redhat.com/5.2/sparc/mailx-8.1.1-16.sparc.rpm
> ftp://updates.redhat.com/5.2/sparc/perl-5.004m7-2.sparc.rpm
> 
> alpha:
> ftp://updates.redhat.com/5.2/alpha/mailx-8.1.1-16.alpha.rpm
> ftp://updates.redhat.com/5.2/alpha/perl-5.004m7-2.alpha.rpm
> 
> i386:
> ftp://updates.redhat.com/5.2/i386/mailx-8.1.1-16.i386.rpm
> ftp://updates.redhat.com/5.2/i386/perl-5.004m7-2.i386.rpm
> 
> sources:
> ftp://updates.redhat.com/5.2/SRPMS/mailx-8.1.1-16.src.rpm
> ftp://updates.redhat.com/5.2/SRPMS/perl-5.004m7-2.src.rpm
> 
> Red Hat Linux 6.0, 6.1, 6.2:
> 
> sparc:
> ftp://updates.redhat.com/6.2/sparc/mailx-8.1.1-16.sparc.rpm
> ftp://updates.redhat.com/6.2/sparc/perl-5.00503-11.sparc.rpm
> 
> i386:
> ftp://updates.redhat.com/6.2/i386/mailx-8.1.1-16.i386.rpm
> ftp://updates.redhat.com/6.2/i386/perl-5.00503-11.i386.rpm
> 
> alpha:
> ftp://updates.redhat.com/6.2/alpha/mailx-8.1.1-16.alpha.rpm
> ftp://updates.redhat.com/6.2/alpha/perl-5.00503-11.alpha.rpm
> 
> sources:
> ftp://updates.redhat.com/6.2/SRPMS/mailx-8.1.1-16.src.rpm
> ftp://updates.redhat.com/6.2/SRPMS/perl-5.00503-11.src.rpm
> 
> 7. Verification:
> 
> MD5 sum                           Package Name
> --------------------------------------------------------------------------
> c514911db4ce13fc32af5b59233d5dc9  5.2/SRPMS/mailx-8.1.1-16.src.rpm
> 7440313c13c65142c75e35d32b5807c3  5.2/SRPMS/perl-5.004m7-2.src.rpm
> 430fca595dd42648239b8ad475032c9c  5.2/alpha/mailx-8.1.1-16.alpha.rpm
> 876b94f7d4fd4d92142f44de51045591  5.2/alpha/perl-5.004m7-2.alpha.rpm
> fd9d44b8aeadc36bd871dd8e2d6211c4  5.2/i386/mailx-8.1.1-16.i386.rpm
> 0a1f47cacb891c03b351211d4fe825ed  5.2/i386/perl-5.004m7-2.i386.rpm
> 376f28398c607b4af12d06babbd7e098  5.2/sparc/mailx-8.1.1-16.sparc.rpm
> 24e61c42e5a22dbbc929264a1ddc3869  5.2/sparc/perl-5.004m7-2.sparc.rpm
> 30d2f82abfba4ac2c770b66c591d528f  6.2/SRPMS/mailx-8.1.1-16.src.rpm
> 5cfe855e78b1ed7672e4daa738093f2c  6.2/SRPMS/perl-5.00503-11.src.rpm
> 25497e13b1d30f3dcff365602f78208a  6.2/alpha/mailx-8.1.1-16.alpha.rpm
> 452714b1ddfd479cb683b21ca54d27a3  6.2/alpha/perl-5.00503-11.alpha.rpm
> c121c2076bae78f42afcf9f0357549b9  6.2/i386/mailx-8.1.1-16.i386.rpm
> ff573609cbe0de0fe72838b0139992da  6.2/i386/perl-5.00503-11.i386.rpm
> 6464e30268ba05a2ca938b38805a9256  6.2/sparc/mailx-8.1.1-16.sparc.rpm
> fa63980aed3bdd2c9c14dcca6745c56c  6.2/sparc/perl-5.00503-11.sparc.rpm
> 
> These packages are GPG signed by Red Hat, Inc. for security.  Our key
> is available at:
>     http://www.redhat.com/corp/contact.html
> 
> You can verify each package with the following command:
>     rpm --checksig  <filename>
> 
> If you only wish to verify that each package has not been corrupted or
> tampered with, examine only the md5sum with the following command:
>     rpm --checksig --nogpg <filename>
> 
> 8. References:
> 
> http://www.securityfocus.com/vdb/bottom.html?vid=1547
> http://bugs.perl.org/perlbug.cgi?req=tidmids&tidmids=20000806.001
> 
> 
> Copyright(c) 2000 Red Hat, Inc.
> 
> 

----- End forwarded message -----

--------------------------------------------------------------------------
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3
Pengelola dapat dihubungi lewat [EMAIL PROTECTED]


Kirim email ke