-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: mutt
Announcement-ID: SuSE-SA:2002:001
Date: Monday, Jan 7th 2001 20:30 MET
Affected SuSE versions: 6.4, 7.0, 7.1, 7.2, 7.3
Vulnerability Type: local privilege escalation
Severity (1-10): 6
SuSE default package: yes
Other affected systems: systems with the mutt mailer installed
Content of this advisory:
1) security vulnerability resolved: mutt
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
mutt, a popular mail client for Linux-like systems, is vulnerable to a
buffer overflow that is remotely exploitable. We have added patches to
the versions of mutt as shipped with the affected distributions to fix
the problem. We recommend to install the update package for your product
and to restart all running instances of mutt.
We thank Joost Pol for reporting the problem to the makers of mutt.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
NOTE:
The SuSE Linux 7.0 distribution was shipped with two packages that contain
the mutt mail program: "mutt" and "muttssl". For legal reasons, the
muttssl package is available from the German ftp server ftp.suse.de.
You can find out which version of the mutt package you are using with
the following command:
rpm -qf /usr/bin/mutt
You only need to download and install the update package for the package
that is installed on your system.
i386 Intel Platform:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n1/mutt-1.3.22.1i-105.i386.rpm
65dd9854d16c9e3178aaff935486ab8a
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/mutt-1.3.22.1i-105.src.rpm
6efacb822144a49de85bb417f677dba6
SuSE-7.2
ftp://ftp.suse.com/pub/suse/i386/update/7.2/n1/mutt-1.3.16i-71.i386.rpm
012e18c5cd2122218b396ae3600fa875
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/mutt-1.3.16i-71.src.rpm
5755b3e620a49bcb93893c524ecceb1b
SuSE-7.1
ftp://ftp.suse.com/pub/suse/i386/update/7.1/n1/mutt-1.3.12i-51.i386.rpm
40df9d8f98dcebc7057849a246f16e21
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/mutt-1.3.12i-51.src.rpm
c689f09724acc63065a66e291dedc85b
SuSE-7.0
ftp://ftp.suse.com/pub/suse/i386/update/7.0/n1/mutt-1.2.5i-38.i386.rpm
1e7d85e9f499ebf4b3fe749d8669de9e
ftp://ftp.suse.de/pub/suse/i386/update/7.0/sec1/muttssl-1.2.5i-14.i386.rpm
a61d53a1e65299b558c799654e57203f
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/7.0/zq1/mutt-1.2.5i-38.src.rpm
543834be481fc61d8390a72cd42feeb0
source rpm:
ftp://ftp.suse.de/pub/suse/i386/update/7.0/zq1/muttssl-1.2.5i-14.src.rpm
e67f148dee40a385136bc31240d51be6
SuSE-6.4
ftp://ftp.suse.com/pub/suse/i386/update/6.4/n1/mutt-1.0.1i-30.i386.rpm
53bae9b840be86683d670b784ec28c8c
source rpm:
ftp://ftp.suse.com/pub/suse/i386/update/6.4/zq1/mutt-1.0.1i-30.src.rpm
c9ebd840ac72c5a3cfe9f45444f9a5e9
Sparc Platform:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n1/mutt-1.3.22.1i-27.sparc.rpm
946ba6c36bd8c46d1ab494f54b288dc6
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/mutt-1.3.22.1i-27.src.rpm
9009e2d4e4f32d437422b8e8ed12ef55
SuSE-7.1
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/n1/mutt-1.3.12i-6.sparc.rpm
50f4f657a6a8bba819a34b2a05a9ea17
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.1/zq1/mutt-1.3.12i-6.src.rpm
e7d3565e2063d76909c1a44e347f71de
SuSE-7.0
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/n1/mutt-1.2.5i-6.sparc.rpm
fe06ca8880f38ea3064764614515f283
ftp://ftp.suse.de/pub/suse/sparc/update/7.0/sec1/muttssl-1.2.5i-8.sparc.rpm
3bdec5870cdddb5be68a8da3ff093de8
source rpm:
ftp://ftp.suse.com/pub/suse/sparc/update/7.0/zq1/mutt-1.2.5i-6.src.rpm
e3492d0390a7271def3955030a5451a0
source rpm:
ftp://ftp.suse.de/pub/suse/sparc/update/7.0/zq1/muttssl-1.2.5i-8.src.rpm
3946004fc966f4135f47ff419bc2d1d6
AXP Alpha Platform:
SuSE-7.1
ftp://ftp.suse.com/pub/suse/axp/update/7.1/n1/mutt-1.3.12i-5.alpha.rpm
0cf2bd45bf05aded0468cad34774cac6
source rpm:
ftp://ftp.suse.com/pub/suse/axp/update/7.1/zq1/mutt-1.3.12i-5.src.rpm
7b04b3b10bb07c1d05ecd2322fd92be9
The AXP Alpha mutt packages for older distributions than 7.1 are currently
being built and will appear at the usual location shortly.
PPC Power PC Platform:
SuSE-7.3
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n1/mutt-1.3.22.1i-63.ppc.rpm
023ad9fde88518a3c07e183712305fd7
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/mutt-1.3.22.1i-63.src.rpm
ed935acf49c36bcb290f4db37c7ae800
The PPC packages for SuSE Linux 7.1 are currently being built and will
appear at the usual location shortly.
SuSE-7.0
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/n1/mutt-1.2.5i-12.ppc.rpm
476ed5e796692adda068a49ed2baf95e
ftp://ftp.suse.de/pub/suse/ppc/update/7.0/sec1/muttssl-1.2.5i-11.ppc.rpm
f4cb8011468d3e476fd7e24f733aec70
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/7.0/zq1/mutt-1.2.5i-12.src.rpm
550d058119f86c54a04d7506dbc1e878
source rpm:
ftp://ftp.suse.de/pub/suse/ppc/update/7.0/zq1/muttssl-1.2.5i-11.src.rpm
caa60a063952cb54582bf7a0885d5d81
SuSE-6.4
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/n1/mutt-1.0.1i-30.ppc.rpm
2ae9d12e448f9f519441c74aeeb64d4d
source rpm:
ftp://ftp.suse.com/pub/suse/ppc/update/6.4/zq1/mutt-1.0.1i-30.src.rpm
e2ae04f334216cbcd82f906a3a2bb83f
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- SuSE Security receive reports about successful exploitation of the
problems in the secure shell package (ssh-1.2.27) on SuSE systems.
Please read the secure shell security announcement from February
2001, available at
http://www.suse.de/de/support/security/adv004_ssh.txt .
More additional information can be found in the openssh announcement at
http://www.suse.de/de/support/security/2001_045_openssh_txt.txt .
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum