A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
emacs21-bin-common
The problem can be corrected by upgrading the affected package to
version 21.3+1-5ubuntu4.2. In general, a standard system upgrade is
sufficient to effect the necessary changes.
Details follow:
Max Vozeler discovered a format string vulnerability in the "movemail"
utility of Emacs. By sending specially crafted packets, a malicious
POP3 server could cause a buffer overflow, which could have been
exploited to execute arbitrary code with the privileges of the user
and the "mail" group (since "movemail" is installed as "setgid mail").
Ubuntu Security Notice USN-76-1 February 07, 2005
emacs21 vulnerability
CAN-2005-0100
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
emacs21-bin-common
The problem can be corrected by upgrading the affected package to
version 21.3+1-5ubuntu4.2. In general, a standard system upgrade is
sufficient to effect the necessary changes.
Details follow:
Max Vozeler discovered a format string vulnerability in the "movemail"
utility of Emacs. By sending specially crafted packets, a malicious
POP3 server could cause a buffer overflow, which could have been
exploited to execute arbitrary code with the privileges of the user
and the "mail" group (since "movemail" is installed as "setgid mail").
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/e/emacs21/emacs21_21.3+1-5ub
untu4.2.diff.gz
Size/MD5: 220180 bc57787061b02474dfd803ddbc08e771
http://security.ubuntu.com/ubuntu/pool/main/e/emacs21/emacs21_21.3+1-5ub
untu4.2.dsc
Size/MD5: 801 f9c6262e8114deeba4430fee03cb7847
http://security.ubuntu.com/ubuntu/pool/main/e/emacs21/emacs21_21.3+1.ori
g.tar.gz
Size/MD5: 18112871 83259d856459b473bf7fb6b6cfead0d2
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/e/emacs21/emacs21-common_21.
3+1-5ubuntu4.2_all.deb
Size/MD5: 10984378 550a747169ae12ba65f568379137dccb
http://security.ubuntu.com/ubuntu/pool/main/e/emacs21/emacs21-el_21.3+1-
5ubuntu4.2_all.deb
Size/MD5: 7149862 b01a5203171f92f03b55c67fcf52dc67
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/e/emacs21/emacs21-bin-common
_21.3+1-5ubuntu4.2_amd64.deb
Size/MD5: 148576 4c04484d1dead472dff48afa013bd749
http://security.ubuntu.com/ubuntu/pool/universe/e/emacs21/emacs21-nox_21
.3+1-5ubuntu4.2_amd64.deb
Size/MD5: 1940154 e05b39ee168bb8480b178cf9e953bdb2
http://security.ubuntu.com/ubuntu/pool/main/e/emacs21/emacs21_21.3+1-5ub
untu4.2_amd64.deb
Size/MD5: 2158448 c166427b672d77108eb951019b7e3d72
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/e/emacs21/emacs21-bin-common
_21.3+1-5ubuntu4.2_i386.deb
Size/MD5: 131160 07d9fe77aa1807cf6fe0d4eeb1fe8838
http://security.ubuntu.com/ubuntu/pool/universe/e/emacs21/emacs21-nox_21
.3+1-5ubuntu4.2_i386.deb
Size/MD5: 1794792 c2795d591670c1c7db8fc57088840935
http://security.ubuntu.com/ubuntu/pool/main/e/emacs21/emacs21_21.3+1-5ub
untu4.2_i386.deb
Size/MD5: 1978432 f5085f2d945c08dc5230cecde8236946
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/e/emacs21/emacs21-bin-common
_21.3+1-5ubuntu4.2_powerpc.deb
Size/MD5: 144576 16a77927200e2ae8eb01b7c78062a38e
http://security.ubuntu.com/ubuntu/pool/universe/e/emacs21/emacs21-nox_21
.3+1-5ubuntu4.2_powerpc.deb
Size/MD5: 1881976 c48d5ce477a7092e7518a446f77caab5
http://security.ubuntu.com/ubuntu/pool/main/e/emacs21/emacs21_21.3+1-5ub
untu4.2_powerpc.deb
Size/MD5: 2087044 8d32d0c234217ac394b89066b0669934
[ reply ]