diff options
Diffstat (limited to 'share/security/advisories/FreeBSD-SA-00:47.pine.asc')
-rw-r--r-- | share/security/advisories/FreeBSD-SA-00:47.pine.asc | 107 |
1 files changed, 107 insertions, 0 deletions
diff --git a/share/security/advisories/FreeBSD-SA-00:47.pine.asc b/share/security/advisories/FreeBSD-SA-00:47.pine.asc new file mode 100644 index 0000000000..95b59f3ed9 --- /dev/null +++ b/share/security/advisories/FreeBSD-SA-00:47.pine.asc @@ -0,0 +1,107 @@ +-----BEGIN PGP SIGNED MESSAGE----- + +============================================================================= +FreeBSD-SA-00:47 Security Advisory + FreeBSD, Inc. + +Topic: pine4 port allows denial of service + +Category: ports +Module: pine4 +Announced: 2000-09-13 +Affects: Ports collection. +Corrected: 2000-07-17 +Credits: Juhapekka Tolvanen <juhtolv@ST.JYU.FI> +Vendor status: Contacted +FreeBSD only: NO + +I. Background + +Pine is a popular mail user agent. + +II. Problem Description + +The pine4 port, versions 4.21 and before, contained a bug which would +cause the program to crash when processing a folder which contains an +email message with a malformed X-Keywords header. The message itself +could be deleted within pine if identified, but other operations such +as closing the folder with the message still present would cause the +program to crash with no apparent cause, discarding changes to the +mailbox. + +The FreeBSD port of pine4 was changed on 2000-07-17 to use an updated +version of the c-client library which is used to handle the mailbox +processing. This library does not contain the bug and versions of +pine4 built with it (i.e. ports or packages dated after the correction +date) do not suffer from this vulnerability. + +The pine4 port is not installed by default, nor is it "part of +FreeBSD" as such: it is part of the FreeBSD ports collection, which +contains over 3800 third-party applications in a ready-to-install +format. The ports collections shipped with FreeBSD 4.1 and 3.5.1 +contain this problem since it was discovered after the releases. + +FreeBSD makes no claim about the security of these third-party +applications, although an effort is underway to provide a security +audit of the most security-critical ports. + +III. Impact + +Remote users can cause pine4 to crash when closing a mail folder by +sending a malformed email. + +If you have not chosen to install the pine4 port/package, then +your system is not vulnerable to this problem. + +IV. Workaround + +Deinstall the pine4 port/package, if you have installed it. + +It may be possible to use a mail filtering utility such as procmail +(available in FreeBSD ports as /usr/ports/mail/procmail) to filter out +the malformed X-Keywords header from incoming mail, but this solution +is not discussed here. + +V. Solution + +One of the following: + +1) Upgrade your entire ports collection and rebuild the pine4 port. + +2) Deinstall the old package and install a new package dated after the +correction date, obtained from: + +ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/mail/pine-4.21.tgz +ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/mail/pine-4.21.tgz +ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/mail/pine-4.21.tgz +ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/mail/pine-4.21.tgz +ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/mail/pine-4.21.tgz + +NOTE: Be sure to check the file creation date on the package, because +the version number of the software has not changed. + +3) download a new port skeleton for the listmanager port from: + +http://www.freebsd.org/ports/ + +and use it to rebuild the port. + +4) Use the portcheckout utility to automate option (3) above. The +portcheckout port is available in /usr/ports/devel/portcheckout or the +package can be obtained from: + +ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/devel/portcheckout-2.0.tgz +ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/devel/portcheckout-2.0.tgz +ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/devel/portcheckout-2.0.tgz +ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/devel/portcheckout-2.0.tgz +ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/devel/portcheckout-2.0.tgz + +-----BEGIN PGP SIGNATURE----- +Version: 2.6.2 + +iQCVAwUBOb/kgFUuHi5z0oilAQEwgAQAnYgLOfvgfM88DLjUXgoZBkVRoroeU8rz +2DXUw4LEQ6ARzruWPepALW2Yls+g5SraDCLHmuTo6tb3vR6kwQ97gQmzNCNDxK9T +/5m4EFYo2ErTOB4nO/MqepJ+/0t4oBPByhaRjQBSqQncaN4FIkWgboqfpbYdL6HC +cnQSlc+0FPs= +=R2n+ +-----END PGP SIGNATURE----- |