Your message dated Tue, 18 Jan 2005 04:47:54 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#253079: fixed in tripwire 2.3.1.2.0-3 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 7 Jun 2004 04:36:04 +0000 >From [EMAIL PROTECTED] Sun Jun 06 21:36:04 2004 Return-path: <[EMAIL PROTECTED]> Received: from 204.57.138.210.xn.2iij.net (mebius) [210.138.57.204] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BXBrg-0002D1-00; Sun, 06 Jun 2004 21:36:04 -0700 Received: by mebius (Postfix, from userid 1000) id 1EFAC4606; Mon, 7 Jun 2004 13:37:02 +0900 (JST) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Hideki Yamane <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: tripwire: Tripwire Format String Vulnerability on reporting mail function X-Mailer: reportbug 2.61 Date: Mon, 07 Jun 2004 13:37:01 +0900 Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-7.0 required=4.0 tests=BAYES_01,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: tripwire Severity: normal Tags: security, sarge, sid Dear tripwire maintainer, I saw an article in securiteam.com about tripwire's vulnerability. That is a "format string vulnerability" exists when tripwire makes an email report. (http://www.securiteam.com/unixfocus/5VP060UD5S.html) It says: "Vulnerable Systems: * Tripwire commercial versions prior and including 2.4 * Tripwire open source versions prior and including 2.3.1" tripwire package in Debian is 2.3.1.2.0-2, so I think this vulnerabilty affects this package. Also there is a patch for original tripwire 2.3.1, check and apply it please. Index: src/tripwire/pipedmailmessage.cpp =================================================================== retrieving revision 1.1 retrieving revision 1.2 diff -u -r1.1 -r1.2 --- src/tripwire/pipedmailmessage.cpp 21 Jan 2001 00:46:48 -0000 1.1 +++ src/tripwire/pipedmailmessage.cpp 26 May 2004 20:59:15 -0000 1.2 @@ -180,7 +180,7 @@ void cPipedMailMessage::SendString( const TSTRING& s ) { - if( _ftprintf( mpFile, s.c_str() ) < 0 ) + if( _ftprintf( mpFile, "%s", s.c_str() ) < 0 ) { TOSTRINGSTREAM estr; estr << TSS_GetString( cTripwire, tripwire::STR_ERR2_MAIL_MESSAGE_COMMAND ) -- Regards, Hideki Yamane henrich @ samba.gr.jp/iijmio-mail.jp --------------------------------------- Received: (at 253079-close) by bugs.debian.org; 18 Jan 2005 09:54:58 +0000 >From [EMAIL PROTECTED] Tue Jan 18 01:54:58 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1Cqq4g-0002QR-00; Tue, 18 Jan 2005 01:54:58 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1Cqpxq-00060l-00; Tue, 18 Jan 2005 04:47:54 -0500 From: Luk Claes <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#253079: fixed in tripwire 2.3.1.2.0-3 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Tue, 18 Jan 2005 04:47:54 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 7 Source: tripwire Source-Version: 2.3.1.2.0-3 We believe that the bug you reported is fixed in the latest version of tripwire, which is due to be installed in the Debian FTP archive: tripwire_2.3.1.2.0-3.diff.gz to pool/main/t/tripwire/tripwire_2.3.1.2.0-3.diff.gz tripwire_2.3.1.2.0-3.dsc to pool/main/t/tripwire/tripwire_2.3.1.2.0-3.dsc tripwire_2.3.1.2.0-3_i386.deb to pool/main/t/tripwire/tripwire_2.3.1.2.0-3_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Luk Claes <[EMAIL PROTECTED]> (supplier of updated tripwire package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 18 Jan 2005 08:54:40 +0100 Source: tripwire Binary: tripwire Architecture: source i386 Version: 2.3.1.2.0-3 Distribution: unstable Urgency: low Maintainer: Luk Claes <[EMAIL PROTECTED]> Changed-By: Luk Claes <[EMAIL PROTECTED]> Description: tripwire - file and directory integrity checker Closes: 230650 240982 244299 249304 251652 253078 253079 255365 258391 267324 279814 Changes: tripwire (2.3.1.2.0-3) unstable; urgency=low . * New maintainer (Closes: #279814) * Acknowledge NMUs Closes: #249304, #253079, #258391, #240982, #244299, #230650, #253078 * man/*: Use \- instead of \(hy or - (Closes: #251652) * debian/control: Depend on exim4 instead of exim (Closes: #255365) * debian/po/pt_BR.po: Update pt_BR translation of the debconf templates (Closes: #267324) * debian/watch: added Files: e62754e45ee67516e61335833d7e3747 588 utils optional tripwire_2.3.1.2.0-3.dsc ba577528645bd27d0a7cca970b01cedb 115192 utils optional tripwire_2.3.1.2.0-3.diff.gz 8a127fe87d65da4364bf7469fbc51988 1739972 utils optional tripwire_2.3.1.2.0-3_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFB7NY55UTeB5t8Mo0RAsj+AKCH0six2YBoqZlxtn8b59/aYg78fwCeJPDv Rt6zpI8JpeMCyU0H3OLggJ4= =LbvL -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]