Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA248] DSA-248-1 hypermail


Vulnerability Assessment Details

[DSA248] DSA-248-1 hypermail

Vulnerability Assessment Summary
DSA-248-1 hypermail

Detailed Explanation for this Vulnerability Assessment

Ulf Härnhammar discovered two problems in hypermail, a program to
create HTML archives of mailing lists.
A possible hacker could craft a long filename for an attachment that would
overflow two buffers when a certain option for interactive use was
given, opening the possibility to inject arbitrary code. This code
would then be executed under the user id hypermail runs as, mostly as
a local user. Automatic and silent use of hypermail does not seem to
be affected.
The CGI program mail, which is not installed by the Debian package,
does a reverse look-up of the user's IP number and copies the
resulting hostname into a fixed-size buffer. A specially crafted DNS
reply could overflow this buffer, opening the program to an exploit.
For the stable distribution (woody) this problem has been fixed in
version 2.1.3-2.0.
For the old stable distribution (potato) this problem has been fixed
in version 2.0b25-1.1.
For the unstable distribution (sid) this problem has been fixed
in version 2.1.6-1.
We recommend that you upgrade your hypermail packages.


Solution : http://www.debian.org/security/2003/dsa-248
Network Security Threat Level: High

Networks Security ID: 6689, 6690

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Intel Xeon E5-2609 v2 2.5GHz 10MB 6.4GT/s SR1AX Server Processor [Grade: Fair]
$37.95
Intel Xeon E5-2609 v2 2.5GHz 10MB 6.4GT/s SR1AX Server Processor [Grade: Fair] pictureHP ProLiant ML350p Gen 8 Server Xeon E5-2630 2.6GHz 32 GB RAM NO HDD
$449.99
HP ProLiant ML350p Gen 8 Server Xeon E5-2630 2.6GHz 32 GB RAM NO HDD pictureINTEL XEON QUAD CORE PROCESSOR E3-1225V3 3.2GHZ 8MB SMART CACHE 5 GT/S CPU
$40.0
INTEL XEON QUAD CORE PROCESSOR E3-1225V3 3.2GHZ 8MB SMART CACHE 5 GT/S CPU picture


Discussions

No Discussions have been posted on this vulnerability.