Your message dated Tue, 18 Jan 2005 04:47:54 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#253079: fixed in tripwire 2.3.1.2.0-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 7 Jun 2004 04:36:04 +0000
>From [EMAIL PROTECTED] Sun Jun 06 21:36:04 2004
Return-path: <[EMAIL PROTECTED]>
Received: from 204.57.138.210.xn.2iij.net (mebius) [210.138.57.204] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1BXBrg-0002D1-00; Sun, 06 Jun 2004 21:36:04 -0700
Received: by mebius (Postfix, from userid 1000)
        id 1EFAC4606; Mon,  7 Jun 2004 13:37:02 +0900 (JST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Hideki Yamane <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: tripwire: Tripwire Format String Vulnerability on reporting mail 
function
X-Mailer: reportbug 2.61
Date: Mon, 07 Jun 2004 13:37:01 +0900
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-7.0 required=4.0 tests=BAYES_01,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: tripwire
Severity: normal
Tags: security, sarge, sid

Dear tripwire maintainer,

 I saw an article in securiteam.com about tripwire's vulnerability.
 That is a "format string vulnerability" exists when tripwire makes
 an email report. 
 (http://www.securiteam.com/unixfocus/5VP060UD5S.html)

 It says:

 "Vulnerable Systems:
   * Tripwire commercial versions prior and including 2.4
   * Tripwire open source versions prior and including 2.3.1"
   
 tripwire package in Debian is 2.3.1.2.0-2, so I think this 
 vulnerabilty affects this package.


 Also there is a patch for original tripwire 2.3.1, check and
  apply it please.

Index: src/tripwire/pipedmailmessage.cpp
 ===================================================================
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- src/tripwire/pipedmailmessage.cpp 21 Jan 2001 00:46:48 -0000 1.1
+++ src/tripwire/pipedmailmessage.cpp 26 May 2004 20:59:15 -0000 1.2
@@ -180,7 +180,7 @@

 void cPipedMailMessage::SendString( const TSTRING& s )
 {
- if( _ftprintf( mpFile, s.c_str() ) < 0 )
+ if( _ftprintf( mpFile, "%s", s.c_str() ) < 0 )
     {
         TOSTRINGSTREAM estr;
         estr << TSS_GetString( cTripwire,
tripwire::STR_ERR2_MAIL_MESSAGE_COMMAND )


--
Regards,

 Hideki Yamane     henrich @ samba.gr.jp/iijmio-mail.jp

---------------------------------------
Received: (at 253079-close) by bugs.debian.org; 18 Jan 2005 09:54:58 +0000
>From [EMAIL PROTECTED] Tue Jan 18 01:54:58 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1Cqq4g-0002QR-00; Tue, 18 Jan 2005 01:54:58 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1Cqpxq-00060l-00; Tue, 18 Jan 2005 04:47:54 -0500
From: Luk Claes <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#253079: fixed in tripwire 2.3.1.2.0-3
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 18 Jan 2005 04:47:54 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 7

Source: tripwire
Source-Version: 2.3.1.2.0-3

We believe that the bug you reported is fixed in the latest version of
tripwire, which is due to be installed in the Debian FTP archive:

tripwire_2.3.1.2.0-3.diff.gz
  to pool/main/t/tripwire/tripwire_2.3.1.2.0-3.diff.gz
tripwire_2.3.1.2.0-3.dsc
  to pool/main/t/tripwire/tripwire_2.3.1.2.0-3.dsc
tripwire_2.3.1.2.0-3_i386.deb
  to pool/main/t/tripwire/tripwire_2.3.1.2.0-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luk Claes <[EMAIL PROTECTED]> (supplier of updated tripwire package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 18 Jan 2005 08:54:40 +0100
Source: tripwire
Binary: tripwire
Architecture: source i386
Version: 2.3.1.2.0-3
Distribution: unstable
Urgency: low
Maintainer: Luk Claes <[EMAIL PROTECTED]>
Changed-By: Luk Claes <[EMAIL PROTECTED]>
Description: 
 tripwire   - file and directory integrity checker
Closes: 230650 240982 244299 249304 251652 253078 253079 255365 258391 267324 
279814
Changes: 
 tripwire (2.3.1.2.0-3) unstable; urgency=low
 .
   * New maintainer (Closes: #279814)
   * Acknowledge NMUs
     Closes: #249304, #253079, #258391, #240982, #244299, #230650, #253078
   * man/*: Use \- instead of \(hy or - (Closes: #251652)
   * debian/control: Depend on exim4 instead of exim (Closes: #255365)
   * debian/po/pt_BR.po: Update pt_BR translation of the debconf
     templates (Closes: #267324)
   * debian/watch: added
Files: 
 e62754e45ee67516e61335833d7e3747 588 utils optional tripwire_2.3.1.2.0-3.dsc
 ba577528645bd27d0a7cca970b01cedb 115192 utils optional 
tripwire_2.3.1.2.0-3.diff.gz
 8a127fe87d65da4364bf7469fbc51988 1739972 utils optional 
tripwire_2.3.1.2.0-3_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFB7NY55UTeB5t8Mo0RAsj+AKCH0six2YBoqZlxtn8b59/aYg78fwCeJPDv
Rt6zpI8JpeMCyU0H3OLggJ4=
=LbvL
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to