exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-038

Mandriva Linux Security Advisory 2010-038
Posted Feb 16, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-038 - main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the.mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file. The updated packages have been patched to correct this issue.

tags | advisory, local, root
systems | linux, mandriva
advisories | CVE-2010-0301
SHA-256 | a594ca8f9397f7050a0c918b62589d0df31710cea19426d9dd51300c8f33d6ee

Mandriva Linux Security Advisory 2010-038

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:038
https://www.mandriva.com/security/
_______________________________________________________________________

Package : maildrop
Date : February 16, 2010
Affected: Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability have been discovered and corrected in maildrop:

main.C in maildrop 2.3.0 and earlier, when run by root with the -d
option, uses the gid of root for execution of the .mailfilter file in
a user's home directory, which allows local users to gain privileges
via a crafted file (CVE-2010-0301).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0301
_______________________________________________________________________

Updated Packages:

Corporate 4.0:
f6b752753fa1a4e5fb050915672ca251 corporate/4.0/i586/maildrop-1.7.0-9.1.20060mlcs4.i586.rpm
c30751bbbaa99dbe6bf787280ad1e163 corporate/4.0/i586/maildrop-devel-1.7.0-9.1.20060mlcs4.i586.rpm
ac29677303ed83a59d852fc202d2b39e corporate/4.0/i586/maildrop-mysql-1.7.0-9.1.20060mlcs4.i586.rpm
1d0219502b50788dcfc6cf5651c5c4aa corporate/4.0/i586/maildrop-openldap-1.7.0-9.1.20060mlcs4.i586.rpm
e1862d87d5f4003dbe722f33dc5f0d82 corporate/4.0/SRPMS/maildrop-1.7.0-9.1.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
cdf43f77a101efc865d290e4abd16c08 corporate/4.0/x86_64/maildrop-1.7.0-9.1.20060mlcs4.x86_64.rpm
373c837656ef6099862e8cd89df7dc69 corporate/4.0/x86_64/maildrop-devel-1.7.0-9.1.20060mlcs4.x86_64.rpm
d5b96bb02e49413db3aefd660ee34203 corporate/4.0/x86_64/maildrop-mysql-1.7.0-9.1.20060mlcs4.x86_64.rpm
2c768ab880f838c7c3513ae6f8bcc962 corporate/4.0/x86_64/maildrop-openldap-1.7.0-9.1.20060mlcs4.x86_64.rpm
e1862d87d5f4003dbe722f33dc5f0d82 corporate/4.0/SRPMS/maildrop-1.7.0-9.1.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
eee3e4db386d93afc826f636fa4d8f83 mes5/i586/maildrop-1.7.0-14.1mdvmes5.i586.rpm
f11f173c784f5b13e103412ef1b80fbb mes5/i586/maildrop-devel-1.7.0-14.1mdvmes5.i586.rpm
41653a4ef502a213639fef75b731bd94 mes5/i586/maildrop-mysql-1.7.0-14.1mdvmes5.i586.rpm
58180f1d9d33f553dec2cced968aa60d mes5/i586/maildrop-openldap-1.7.0-14.1mdvmes5.i586.rpm
c17caf47894ecd0d5b435b4ba767e561 mes5/SRPMS/maildrop-1.7.0-14.1mdvmes5.src.rpm

Mandriva Enterprise Server 5/X86_64:
dd15808097dda7662345f5e54c597d45 mes5/x86_64/maildrop-1.7.0-14.1mdvmes5.x86_64.rpm
ebb970d1a70d506119646edc096f8d3c mes5/x86_64/maildrop-devel-1.7.0-14.1mdvmes5.x86_64.rpm
44922a84217f505350c3c5e489ec8088 mes5/x86_64/maildrop-mysql-1.7.0-14.1mdvmes5.x86_64.rpm
15217994457847511ea2ae7291e8c556 mes5/x86_64/maildrop-openldap-1.7.0-14.1mdvmes5.x86_64.rpm
c17caf47894ecd0d5b435b4ba767e561 mes5/SRPMS/maildrop-1.7.0-14.1mdvmes5.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

https://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLes4TmqjQ0CJFipgRAjrEAJ9oam8bmZsk0DjKC3TvrYclBeKelwCfSoJt
Z4Oy5RxoCppnEo5V7zXM6Ew=
=SMPt
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close