[yellowdog-updates] Yellow Dog Linux Security Advisory: YDU-20010725-15


Subject: [yellowdog-updates] Yellow Dog Linux Security Advisory: YDU-20010725-15
dburcaw@newhope.terraplex.com
Date: Thu Aug 09 2001 - 17:32:57 MDT


Yellow Dog Linux Security Announcement
--------------------------------------

Package: imap
Issue Date: July 25, 2001
Priority: high
Advisory ID: YDU-20010725-15

1. Topic:

        Updated imap packages are available which fix
        several buffer overflow vulnerabilities found
        in the version that shipped with YDL 2.0.

2. Problem:

        "Several buffer overflow vulnerabilities have been found by both the
        authors of UW imap and others. The vulnerabilities are only
        exploitable after a user has authenticated with the server, giving
        a remote shell restricted to the permissions of the authenticated
        user.

        Impact: Systems that already allow users remote shell access are
        not affected by the buffer overflow vulnerabilities; however, it is
        highly recommended that all systems be upgraded to this release,
        as it fixes other server crabugs as well.

        In addition, imap server crashing problems related to messages
        containing null characters in the message body have been fixed in
        this release."
        (from Red Hat's security advisory)

3. Solution:

           a) Updating via yup...
           We suggest that you use the Yellow Dog Update Program (yup)
           to keep your system up-to-date. The following command(s) will
           automatically retrieve and install the fixed version of
           this update onto your system:

                   yup update imap
                yup update imap-devel

           b) Updating manually...
           The update can also be retrieved manually from our ftp site
           below along with the rpm command that should be used to install
           the update. (Please use a mirror site)

                   ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.0/ppc/RPMS/
                rpm -Fvh imap-2000c-10.ppc.rpm
                rpm -Fvh imap-devel-2000c-10.ppc.rpm

4. Verification

MD5 checksum Package
-------------------------------- ----------------------------
cb1b1f615ebe5778c2a765afb3526e0d SRPMS/imap-2000c-10.src.rpm
c3fa7f589efab6a5af948f109cccc81b ppc/RPMS/imap-2000c-10.ppc.rpm
c8db0750f9fb99cc5b9ea83ae82450ca ppc/RPMS/imap-devel-2000c-10.ppc.rpm

If you wish to verify that each package has not been corrupted or tampered with,
examine the md5sum with the following command: rpm --checksig --nogpg filename

5. Misc.

Terra Soft has setup a moderated mailing list where these security, bugfix, and package
enhancement announcements will be posted. See http://lists.yellowdoglinux.com/ for more
information.

For information regarding the usage of yup, the Yellow Dog Update Program, see
http://devel.yellowdoglinux.com/rp_yup.shtml



This archive was generated by hypermail 2a24 : Thu Aug 09 2001 - 17:35:11 MDT