-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: inn 2.2.2 (and earlier)
Date: Wed Jun 7 12:24:25 MEST 2000
Affected SuSE versions: 6.1-6.4
Vulnerability Type: remote news compromise
SuSE default package: no
Other affected systems: all unix systems using innd 2.x (x < 4)
______________________________________________________________________________
A security hole was discovered in the package mentioned above.
Please update it as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.
Please note that we provide this information on an "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________
1. Problem Description
The Usenet News server innd does not check the size of a stack buffer,
when verifying 'cancel requests'. This verification is not enabled by
default (s. innd.conf, 'verifycancels' is set to 'fasle').
2. Impact
If the 'verifycancels' option in innd.conf is set to 'true', it will
enable an attacker to remotely execute arbitrary code with the privileges
of user news on the INN server.
3. Solution
Update the package from our FTP server if you use 'verifycancels'
option.
(Pease note, that this option is not recommended by the innd maintainer and
will also be removed in innd 2.4).
______________________________________________________________________________
Please verify these md5 checksums of the updates before installing:
The i386 RPM for 6.1 will be released next week.
(For SuSE 6.0, please use the 6.1 updates)
AXP:
259a0ad4e170a4e2576b463603549fd5 ftp://ftp.suse.com/pub/suse/axp/update/6.1/n1/inn-2.2.2-86.alpha.rpm
1a5ce9202c8be84034b1b29231a6def8 ftp://ftp.suse.com/pub/suse/axp/update/6.3/n1/inn-2.2.2-86.alpha.rpm
eb9126f54ce84976b3a70e1ba6d0ec33 ftp://ftp.suse.com/pub/suse/axp/update/6.4/n1/inn-2.2.2-86.alpha.rpm
i386:
de109ff3db535715c16bf43554d480ce ftp://ftp.suse.com/pub/suse/i386/update/6.2/n1/inn-2.2.2-86.i386.rpm
9a74e82f9e8911372029aec87bde7692 ftp://ftp.suse.com/pub/suse/i386/update/6.3/n1/inn-2.2.2-86.i386.rpm
caac7436f8e4373880d369a640f52e5f ftp://ftp.suse.com/pub/suse/i386/update/6.4/n1/inn-2.2.2-86.i386.rpm
PPC:
a588c1b72a868a28d96f283163511451 ftp://ftp.suse.com/pub/suse/ppc/update/6.3/n1/inn-2.2.2-86.ppc.rpm
4a0e636a05c79e5810d7660af5be41bd ftp://ftp.suse.com/pub/suse/ppc/update/6.4/n1/inn-2.2.2-86.ppc.rpm
______________________________________________________________________________
You can find updates on our ftp-Server:
ftp://ftp.suse.com/pub/suse/i386/update for Intel processors
ftp://ftp.suse.com/pub/suse/axp/update for Alpha processors
ftp://ftp.suse.com/pub/suse/ppc/update for PPC processors
or try the following web pages for a list of mirrors:
http://www.suse.de/ftp.html
http://www.suse.com/ftp_new.html
Our webpage for patches:
http://www.suse.de/patches/index.html
Our webpage for security announcements:
http://www.suse.de/security
If you want to report vulnerabilities, please contact
security@suse.de
______________________________________________________________________________
SuSE has got two free security mailing list services to which any
interested party may subscribe:
suse-security@suse.com - moderated and for general/linux/SuSE
security discussions. All SuSE security
announcements are sent to this list.
suse-security-announce@suse.com - SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent
to this list.
To subscribe to the list, send a message to: