Numerous vulnerabilities in the HylaFAX product exist in versions prior to 4.1.3. It does not check the TSI string which is received from remote FAX systems before using it in logging and other places.
|
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
________________________________________________________________________
Mandrake Linux Security Update Advisory
________________________________________________________________________
Package name: hylafax
Advisory ID: MDKSA-2002:055
Date: August 28th, 2002
Affected versions: 7.1, 7.2, 8.0, 8.1, 8.2, Corporate Server 1.0.1
________________________________________________________________________
Problem Description:
Numerous vulnerabilities in the HylaFAX product exist in versions prior
to 4.1.3. It does not check the TSI string which is received from
remote FAX systems before using it in logging and other places. A
remote sender using a specially formatted TSI string can cause the
faxgetty program to segfault, resulting in a denial of service. Format
string vulnerabilities were also discovered by Christer Oberg, which
exist in a number of utilities bundled with HylaFax, such as faxrm,
faxalter, faxstat, sendfax, sendpage, and faxwatch. If any of these
tools are setuid, they could be used to elevate system privileges.
Mandrake Linux does not, by default, install these tools setuid.
Finally, Lee Howard discovered that faxgetty would segfault due to a
buffer overflow after receiving a very large line of image data. This
vulnerability could conceivably be used to execute arbitrary commands
on the system as root, and could also be exploited more easily as a
denial of sevice.
________________________________________________________________________
References:
http://www.securityfocus.com/archive/1/215984
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-1034
http://www.securityfocus.com/bid/3357
________________________________________________________________________
Updated Packages:
Linux-Mandrake 7.1:
1bbb83c824d07e017a36c2c85b92c3b7 7.1/RPMS/hylafax-4.1-0.11mdk.i586.rpm
3f4e469a6c57529fe02025ea7b4bef45 7.1/RPMS/hylafax-client-4.1-0.11mdk.i586.rpm
9b0952a5701bc2ffaa6068b4b0901ede 7.1/RPMS/hylafax-server-4.1-0.11mdk.i586.rpm
c44d130f10049d79f7a60601b9844b6e 7.1/SRPMS/hylafax-4.1-0.11mdk.src.rpm
Linux-Mandrake 7.2:
37c7c3efa774714204c22e6bde81f432 7.2/RPMS/hylafax-4.1-0.11mdk.i586.rpm
37cb7b798ffaf93aba0782b4fb760a39 7.2/RPMS/hylafax-client-4.1-0.11mdk.i586.rpm
b28df42826dc9a833c7f19ad92dacbec 7.2/RPMS/hylafax-server-4.1-0.11mdk.i586.rpm
c44d130f10049d79f7a60601b9844b6e 7.2/SRPMS/hylafax-4.1-0.11mdk.src.rpm
Mandrake Linux 8.0:
a3676fb894765134d5669f914e39f10c 8.0/RPMS/hylafax-4.1.3-1.1mdk.i586.rpm
27c72f3ad72e85abc4c527fa44d625e9 8.0/RPMS/hylafax-client-4.1.3-1.1mdk.i586.rpm
b1effc6accf5c808694ee312abf08140 8.0/RPMS/hylafax-server-4.1.3-1.1mdk.i586.rpm
070d143881cf21632484fcd65fad1aa0 8.0/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.i586.rpm
a4f1487efa5cc026103d80c96dd41a43 8.0/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.i586.rpm
ff2a96e07f08a70a8f0d9b734a37c122 8.0/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm
Mandrake Linux 8.0/ppc:
e51efc370f2bb4af971457edd5dda1e9 ppc/8.0/RPMS/hylafax-4.1.3-1.1mdk.ppc.rpm
3b15cb44ed18c353c154e7d97fecc4ba ppc/8.0/RPMS/hylafax-client-4.1.3-1.1mdk.ppc.rpm
73af1b321e30ed8d7740c1e8a0b60a67 ppc/8.0/RPMS/hylafax-server-4.1.3-1.1mdk.ppc.rpm
6225da0393fd8f80c2dfebd85df5998e ppc/8.0/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.ppc.rpm
eac3efd3d7c5184312bd4aa793a8a8e7 ppc/8.0/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.ppc.rpm
ff2a96e07f08a70a8f0d9b734a37c122 ppc/8.0/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm
Mandrake Linux 8.1:
1947a6895cdfe3c4bda4fc100b3c1276 8.1/RPMS/hylafax-4.1.3-1.1mdk.i586.rpm
13fcd879330de0cb58bc8c8c99595291 8.1/RPMS/hylafax-client-4.1.3-1.1mdk.i586.rpm
2450c7ec306a4e5c9e6a73d8d09bafc6 8.1/RPMS/hylafax-server-4.1.3-1.1mdk.i586.rpm
862d14c12e65ee9f82451ad911bc8df7 8.1/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.i586.rpm
f5b5c5a4b3137277793adf385ffba962 8.1/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.i586.rpm
ff2a96e07f08a70a8f0d9b734a37c122 8.1/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm
Mandrake Linux 8.1/ia64:
07a96e577b97485a6d723743196ad248 ia64/8.1/RPMS/hylafax-4.1.3-1.1mdk.ia64.rpm
1d2ee7c691e72978ea49c0eec3c945b4 ia64/8.1/RPMS/hylafax-client-4.1.3-1.1mdk.ia64.rpm
248d6879e45952ae2c9494e91297b0b6 ia64/8.1/RPMS/hylafax-server-4.1.3-1.1mdk.ia64.rpm
3f48d8f2283917f3b451dcaf9deb3edf ia64/8.1/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.ia64.rpm
16dee4b27fc1fc63ccd377e1340d371c ia64/8.1/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.ia64.rpm
ff2a96e07f08a70a8f0d9b734a37c122 ia64/8.1/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm
Mandrake Linux 8.2:
e3c962f212ba5faf2bbbf9bbe97ac39b 8.2/RPMS/hylafax-4.1.3-1.1mdk.i586.rpm
27d3a86f8bd39560468fdc5b9be66269 8.2/RPMS/hylafax-client-4.1.3-1.1mdk.i586.rpm
60f4529da79fcc543502d650a2782178 8.2/RPMS/hylafax-server-4.1.3-1.1mdk.i586.rpm
0f2044dfb51f6b086f0620965f810da3 8.2/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.i586.rpm
0542d8bd7f1f98784af674c107ede594 8.2/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.i586.rpm
ff2a96e07f08a70a8f0d9b734a37c122 8.2/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm
Mandrake Linux 8.2/ppc:
72c6a45d7a11fb1b69a3fd8ebb9b0fc8 ppc/8.2/RPMS/hylafax-4.1.3-1.1mdk.ppc.rpm
a26c8f863ac3b71ebea178e3a946b173 ppc/8.2/RPMS/hylafax-client-4.1.3-1.1mdk.ppc.rpm
16bab89e373b104b3cbe910e103297e8 ppc/8.2/RPMS/hylafax-server-4.1.3-1.1mdk.ppc.rpm
a2fe9322f593f6d56f319c439e4a952d ppc/8.2/RPMS/libhylafax4.1.1-4.1.3-1.1mdk.ppc.rpm
2d60a7ab5d1b41b85511f3302a5044de ppc/8.2/RPMS/libhylafax4.1.1-devel-4.1.3-1.1mdk.ppc.rpm
ff2a96e07f08a70a8f0d9b734a37c122 ppc/8.2/SRPMS/hylafax-4.1.3-1.1mdk.src.rpm
Corporate Server 1.0.1:
1bbb83c824d07e017a36c2c85b92c3b7 1.0.1/RPMS/hylafax-4.1-0.11mdk.i586.rpm
3f4e469a6c57529fe02025ea7b4bef45 1.0.1/RPMS/hylafax-client-4.1-0.11mdk.i586.rpm
9b0952a5701bc2ffaa6068b4b0901ede 1.0.1/RPMS/hylafax-server-4.1-0.11mdk.i586.rpm
c44d130f10049d79f7a60601b9844b6e 1.0.1/SRPMS/hylafax-4.1-0.11mdk.src.rpm
________________________________________________________________________
Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
________________________________________________________________________
To upgrade automatically, use MandrakeUpdate. The verification of md5
checksums and GPG signatures is performed automatically for you.
If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of
FTP mirrors can be obtained from:
http://www.mandrakesecure.net/en/ftp.php
Please verify the update prior to upgrading to ensure the integrity of
the downloaded package. You can do this with the command:
rpm --checksig <filename>
All packages are signed by MandrakeSoft for security. You can obtain
the GPG public key of the Mandrake Linux Security Team from:
https://www.mandrakesecure.net/RPM-GPG-KEYS
Please be aware that sometimes it takes the mirrors a few hours to
update.
You can view other update advisories for Mandrake Linux at:
http://www.mandrakesecure.net/en/advisories/
MandrakeSoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained by
visiting:
http://www.mandrakesecure.net/en/mlist.php
If you want to report vulnerabilities, please contact
security@linux-mandrake.com
________________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security@linux-mandrake.com>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.7 (GNU/Linux)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=yGlX
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE9boRjmqjQ0CJFipgRAougAJ4iW8vJLzjt8Sn/HLRxb+cUgtoUTgCbBqas
Cr17AZYeMB+5mAA1SqvLuf8=
=Ba7y
-----END PGP SIGNATURE-----
|