|
ru.linux- RU.LINUX --------------------------------------------------------------------- From : Konstantin Tokar 2:5020/400 13 Mar 2002 23:09:05 To : andrey i. mavlyanov Subject : Re: qmail -- что можно сказать против? --------------------------------------------------------------------------------
> >> > yes Бредятина.
> >> 'security' у него - всего лишь степень разнесенности на разные
> >> процессы с разными якобы uid'ами. Что само по себе дает толку 0.
> KT> Ещё не ломают его пока. А вот exim в начале года отличился.
>
> а что там было?
>
Hичего особенного, вот выдержка из дебиановского сообщения, другие
примерно это же писали, но debian подробнее.
Debian Security Advisory DSA 097-1
security@debian.org
http://www.debian.org/security/ Martin
Schulze
January 3rd, 2002
-
--------------------------------------------------------------------------
Package : exim
Vulnerability : Uncontrolled program execution
Problem-Type : remote vulnerability
Debian-specific: no
Patrice Fournier discovered a bug in all versions of Exim older than
Exim 3.34 and Exim 3.952.
The Exim maintainer, Philip Hazel, writes about this issue: "The
problem exists only in the case of a run time configuration which
directs or routes an address to a pipe transport without checking the
local part of the address in any way. This does not apply, for
example, to pipes run from alias or forward files, because the local
part is checked to ensure that it is the name of an alias or of a
local user. The bug's effect is that, instead of obeying the correct
pipe command, a broken Exim runs the command encoded in the local part
of the address."
This problem has been fixed in Exim version 3.12-10.2 for the stable
distribution Debian GNU/Linux 2.2 and 3.33-1.1 for the testing and
unstable distribution. We recommend that you upgrade your exim
package.
The Exim maintainer, Philip Hazel, writes about this issue: "The
problem exists only in the case of a run time configuration which
directs or routes an address to a pipe transport without checking the
local part of the address in any way. This does not apply, for
example, to pipes run from alias or forward files, because the local
part is checked to ensure that it is the name of an alias or of a
local user. The bug's effect is that, instead of obeying the correct
pipe command, a broken Exim runs the command encoded in the local part
of the address."
This problem has been fixed in Exim version 3.12-10.2 for the stable
distribution Debian GNU/Linux 2.2 and 3.33-1.1 for the testing and
unstable distribution. We recommend that you upgrade your exim
package.
--- ifmail v.2.15dev5
* Origin: Demos online service (2:5020/400)
Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.linux/12770e4a476d5.html, оценка из 5, голосов 10
|