Vixie Cron MAILTO发送邮件漏洞

漏洞信息详情

Vixie Cron MAILTO发送邮件漏洞

漏洞简介

基于Linux系统的Vixie Cron存在漏洞。本地用户可以借助MAILTO环境变量设置发送邮件命令的参数。

漏洞公告

The solution is to validate the contents of the MAILTO environment variable to insure it can’t pass command line arguments to sendmail. As an added precaution the cron deamon should execute sendmail with the user id of the user the queue the commands for execution instead of doing it as root.
RedHat has made the following updated RPMs available:
Red Hat Linux 4.2:
Intel:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/4.2/i386/vixie-cron-3.0.1-37.4.2.i386.rpm
Alpha:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/4.2/alpha/vixie-cron-3.0.1-37.4.2.alpha.rpm
Sparc:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/4.2/sparc/vixie-cron-3.0.1-37.4.2.sparc.rpm
Source packages:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/4.2/SRPMS/vixie-cron-3.0.1-37.4.2.src.rpm
Red Hat Linux 5.2:
Intel:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/5.2/i386/vixie-cron-3.0.1-37.5.2.i386.rpm
Alpha:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/5.2/alpha/vixie-cron-3.0.1-37.5.2.alpha.rpm
Sparc:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/5.2/sparc/vixie-cron-3.0.1-37.5.2.sparc.rpm
Source packages:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/5.2/SRPMS/vixie-cron-3.0.1-37.5.2.src.rpm
Red Hat Linux 6.0:
Intel:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/6.0/i386/vixie-cron-3.0.1-38.i386.rpm
Alpha:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/6.0/alpha/vixie-cron-3.0.1-38.alpha.rpm
Sparc:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/6.0/sparc/vixie-cron-3.0.1-38.sparc.rpm
Source packages:
rpm -Uvh ftp://ftp.redhat.com/redhat/updates/6.0/SRPMS/vixie-cron-3.0.1-38.src.rpm
Caldera Systems has developed the following fixes for OpenLinux 2.2 ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.2/current/RPMS/vixie-cron-3.0.1-19.i386.rpm.
Debian GNU/Linux 2.1 alias slink
——————————–
This version of Debian was released only for the Intel, the Motorola 68xxx, the alpha and the Sun sparc architecture.
Source archives:
http://security.debian.org/dists/stable/updates/source/cron_3.0pl1-50.2.diff.gz
MD5 checksum: 96a4b55e06127c4a6cf31ee511227adb
http://security.debian.org/dists/stable/updates/source/cron_3.0pl1-50.2.dsc MD5 checksum: 3998735f00d3f10a5e290227db6bf611
http://security.debian.org/dists/stable/updates/source/cron_3.0pl1.orig.tar.gz
MD5 checksum: 4c64aece846f8483daf440f8e3dd210f
Alpha architecture:
http://security.debian.org/dists/stable/updates/binary-alpha/cron_3.0pl1-50.2_alpha.deb
MD5 checksum: cbab162fffd7dba71373b3eb62201b52
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/binary-i386/cron_3.0pl1-50.2_i386.deb
MD5 checksum: 85d9ffff103d0121101b7b80817d0abe
Motorola 680×0 architecture:
http://security.debian.org/dists/stable/updates/binary-m68k/cron_3.0pl1-50.2_m68k.deb
MD5 checksum: 62a039991c237a92c4a3cdcef4a328d7
Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/binary-sparc/cron_3.0pl1-50.2_sparc.deb
MD5 checksum: 56f5e099ab621572b560706e1eec9ebb
Debian GNU/Linux pre2.2 alias potato
————————————
Source archives:
http://security.debian.org/dists/unstable/updates/source/cron_3.0pl1-52.diff.gz
MD5 checksum: f500a0dc7175d64de4822f159a51d739
http://security.debian.org/dists/unstable/updates/source/cron_3.0pl1-52.dsc
MD5 checksum: 1a16af335a106805ecdd6585a75ee61a
http://security.debian.org/dists/unstable/updates/source/cron_3.0pl1.orig.tar.gz
MD5 checksum: 4c64aece846f8483daf440f8e3dd210f
Alpha architecture:
http://security.debian.org/dists/unstable/updates/binary-alpha/cron_3.0pl1-52_alpha.deb
MD5 checksum: 8e5246a79269b8f489a3cdb7efc41661
ARM architecture:
http://security.debian.org/dists/unstable/updates/binary-arm/cron_3.0pl1-52_arm.deb
MD5 checksum: 8d103d4a60ec94d1f0fb07caabd34575
Intel ia32 architecture:
http://security.debian.org/dists/unstable/updates/binary-i386/cron_3.0pl1-52_i386.deb
MD5 checksum: a7f8de4f43aa21e2fe94fe602c6c2c83
Motorola 680×0 architecture:
http://security.debian.org/dists/unstable/updates/binary-m68k/cron_3.0pl1-52_m68k.deb
MD5 checksum: b2e866ecc10e95094202327eab5fc0fd
PowerPC architecture:
http://security.debian.org/dists/unstable/updates/binary-powerpc/cron_3.0pl1-52_powerpc.deb
MD5 checksum: 058a25564bc7c9c6fb153eafa0126cee
Sun Sparc architecture:
http://security.debian.org/dists/unstable/updates/binary-sparc/cron_3.0pl1-52_sparc.deb
MD5 checksum: ed34f37c41d9322ba094ede04d8d2e16

参考网址

来源: BID
名称: 611
链接:http://www.securityfocus.com/bid/611

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享