TUCoPS :: Linux :: Debian :: dsa-386.htm

libmailtools-perl - input validation bug

Debian Security Advisory

DSA-386-1 libmailtools-perl -- input validation bug

Date Reported:
18 Sep 2003
Affected Packages:
libmailtools-perl
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CAN-2002-1271.
More information:

The SuSE security team discovered during an audit a bug in Mail::Mailer, a Perl module used for sending email, whereby potentially untrusted input is passed to a program such as mailx, which may interpret certain escape sequences as commands to be executed.

This bug has been fixed by removing support for programs such as mailx as a transport for sending mail. Instead, alternative mechanisms are used.

For the stable distribution (woody) this problem has been fixed in version 1.44-1woody1.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you update your libmailtools-perl package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/libm/libmailtools-perl/libmailtools-perl_1.44-1woody2.dsc
http://security.debian.org/pool/updates/main/libm/libmailtools-perl/libmailtools-perl_1.44-1woody2.diff.gz
http://security.debian.org/pool/updates/main/libm/libmailtools-perl/libmailtools-perl_1.44.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/libm/libmailtools-perl/libmailtools-perl_1.44-1woody2_all.deb
http://security.debian.org/pool/updates/main/libm/libmailtools-perl/mailtools_1.44-1woody2_all.deb

MD5 checksums of the listed files are available in the original advisory.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH