Caldera Pine Advisory

From: Alfred Huger (ahat_private)
Date: Mon Nov 22 1999 - 09:06:22 PST

  • Next message: Jeremy Iverson: "DNA-1999-001: NetTerm FTP Daemon vulnerabilities"

    -----BEGIN PGP SIGNED MESSAGE-----
    
    ______________________________________________________________________________
                       Caldera Systems, Inc.  Security Advisory
    
    Subject:                remote attack on pine users
    Advisory number:        CSSA-1999-036.0
    Issue date:             1999 November, 19
    Cross reference:
    ______________________________________________________________________________
    
    
    1. Problem Description
    
       Versions of pine prior to 4.21 had a security problem when viewing
       URLs. By sending an email with a specially formatted URL embedded
       in it, an attacker could cause arbitrary shell code to be executed
       under the account of the victim user.
    
    2. Vulnerable Versions
    
       Systems : up to COL 2.3
       Packages: up to pine-4.10-1
    
    3. Solutions
    
       Workaround: not known
    
       The proper solution is to upgrade to the latest packages
    
            rpm -U pine-4.21-1.i386.rpm
    
    4. Location of Fixed Packages
    
       The upgrade packages can be found on Caldera's FTP site at:
    
       ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.3/current/RPMS/
    
       The corresponding source code package can be found at:
    
       ftp://ftp.calderaystems.com/pub/OpenLinux/updates/2.3/current/SRPMS
    
    
    5. Installing Fixed Packages
    
       Upgrade the affected packages with the following commands:
    
            rpm -U pine-4.21-1.i386.rpm
    
    6. Verification
    
       93b2cb3b558735b075392cd639e4edda  RPMS/pine-4.21-1.i386.rpm
       7f87c9f295c82f65b9412a4c311986c5  SRPMS/pine-4.21-1.src.rpm
    
    
    7. References
    
       This and other Caldera security resources are located at:
    
       http://www.calderasystems.com/support/security/index.html
    
       This security fix closes Caldera's internal Problem Report 5258
    
    8. Disclaimer
       Caldera Systems, Inc. is not responsible for the misuse of any of the
       information we provide on this website and/or through our security
       advisories. Our advisories are a service to our customers intended to
       promote secure installation and use of Caldera OpenLinux.
    
    ______________________________________________________________________________
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.0 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iQCVAwUBODVSGen+9R4958LpAQGvjgQAnoDjYlthZ+L0vIeIztvUElydo1GKJb4V
    i7jSXKnl5bWKUNhhYqSmPKYRYcJ9KolXXFYqEeC+GcSLfW5VGoxXEZ8B82AynXh0
    0gIw/pLq6pTguifpORzIMWRn81BawtJd8JH6xvV8cRnopAm0zQy7y2iXw3gX2xRa
    l7Wz/qxKshc=
    =jty2
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:13:36 PDT