You are here
Home > Preporuke > Ranjivost programskog paketa procmail

Ranjivost programskog paketa procmail

  • Detalji os-a: LUB
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2340-1
September 04, 2014

procmail vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS

Summary:

formail could be made to crash or run programs if it processed specially
crafted mail.

Software Description:
– procmail: Versatile e-mail processor

Details:

Tavis Ormandy discovered that the formail tool incorrectly handled certain
malformed mail headers. An attacker could use this flaw to cause formail to
crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
procmail 3.22-21ubuntu0.1

Ubuntu 12.04 LTS:
procmail 3.22-19ubuntu0.1

Ubuntu 10.04 LTS:
procmail 3.22-18ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2340-1
CVE-2014-3618

Package Information:
https://launchpad.net/ubuntu/+source/procmail/3.22-21ubuntu0.1
https://launchpad.net/ubuntu/+source/procmail/3.22-19ubuntu0.1
https://launchpad.net/ubuntu/+source/procmail/3.22-18ubuntu1.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=KjjZ
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2014-09-0009-ADV
CveCVE-2014-3618
ID izvornikaUSN-2340-1
Proizvodprocmail
Izvorhttp://www.ubuntu.com
Top
More in Preporuke
Ranjivost programskog paketa apache

Otkrivena je ranjivost u modulu mod_headers unutar Apache HTTP Server 2.2.22 koja udaljenim napadačima omogućuje zaobilaženje direktive "RequestHeader unset" stavljenjem...

Close