Your message dated Thu, 03 Feb 2005 19:02:08 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#293418: fixed in uw-imap 7:2002edebian1-6
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 3 Feb 2005 07:37:31 +0000
>From [EMAIL PROTECTED] Wed Feb 02 23:37:31 2005
Return-path: <[EMAIL PROTECTED]>
Received: from luonnotar.infodrom.org [195.124.48.78] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CwbYR-0001l8-00; Wed, 02 Feb 2005 23:37:31 -0800
Received: by luonnotar.infodrom.org (Postfix, from userid 10)
        id 25525366D6D; Thu,  3 Feb 2005 08:37:32 +0100 (CET)
Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2)
        from infodrom.org by finlandia.Infodrom.North.DE
        via smail from stdin
        id <[EMAIL PROTECTED]>
        for [EMAIL PROTECTED]; Thu, 3 Feb 2005 08:33:14 +0100 (CET) 
Date: Thu, 3 Feb 2005 08:33:14 +0100
From: Martin Schulze <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: CAN-2005-0198: Authentication bypass
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="AW8RmF6KeXgMzg/h"
Content-Disposition: inline
X-Debbugs-Cc: Joey Hess <[EMAIL PROTECTED]>
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,X_DEBBUGS_CC 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--AW8RmF6KeXgMzg/h
Content-Type: multipart/mixed; boundary="TydEFKrGQa51aSOi"
Content-Disposition: inline


--TydEFKrGQa51aSOi
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: uw-imap
Version: 2002edebian1-5
Severity: grave
Tags: security sarge sid patch

A vulnerability was discovered in the CRAM-MD5 authentication in
UW-IMAP where, on the fourth failed authentication attempt, a user
would be able to access the IMAP server regardless.  This problem
exists only if you are using CRAM-MD5 authentication and have an
/etc/cram-md5.pwd file.  This is not the default setup.  This is
also VU#702777 <http://www.kb.cert.org/vuls/id/702777>

I'm attaching the patch.

Please
 . update the package in sid
 . mention the CVE id from the subject in the changelog
 . use priority=3Dhigh
 . no need to upload into sarge directly, except if the version in
   sid is not meant to go into testing

Regards,

        Joey

--=20
We all know Linux is great... it does infinite loops in 5 seconds.
        -- Linus Torvalds

--TydEFKrGQa51aSOi
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: attachment; filename="patch.CAN-2005-0198.uw-imap"

--- imap-2004/src/c-client/auth_md5.c~  2005-01-17 16:38:46.758527958 -0700
+++ imap-2004/src/c-client/auth_md5.c   2005-01-17 16:38:46.758527958 -0700
@@ -153,7 +153,7 @@
                                /* get password */
       if (p = auth_md5_pwd ((authuser && *authuser) ? authuser : user)) {
        pl = strlen (p);
-       u = (md5try && strcmp (hash,hmac_md5 (chal,cl,p,pl))) ? NIL : user;
+       u = (md5try && !strcmp (hash,hmac_md5 (chal,cl,p,pl))) ? user : NIL;
        memset (p,0,pl);        /* erase sensitive information */
        fs_give ((void **) &p); /* flush erased password */
                                /* now log in for real */

--TydEFKrGQa51aSOi--

--AW8RmF6KeXgMzg/h
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFCAdO6W5ql+IAeqTIRAiqzAJwKT3P/Ku8modhO4VRDXuUEqJR6CACgp3A4
vuOc4jAPTsbTF0sLj4IFVRk=
=mYZS
-----END PGP SIGNATURE-----

--AW8RmF6KeXgMzg/h--

---------------------------------------
Received: (at 293418-close) by bugs.debian.org; 4 Feb 2005 00:08:05 +0000
>From [EMAIL PROTECTED] Thu Feb 03 16:08:05 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1Cwr13-0003He-00; Thu, 03 Feb 2005 16:08:05 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1CwqvI-0005ff-00; Thu, 03 Feb 2005 19:02:08 -0500
From: Jonas Smedegaard <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#293418: fixed in uw-imap 7:2002edebian1-6
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Thu, 03 Feb 2005 19:02:08 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: uw-imap
Source-Version: 7:2002edebian1-6

We believe that the bug you reported is fixed in the latest version of
uw-imap, which is due to be installed in the Debian FTP archive:

ipopd-ssl_2002edebian1-6_all.deb
  to pool/main/u/uw-imap/ipopd-ssl_2002edebian1-6_all.deb
ipopd_2002edebian1-6_powerpc.deb
  to pool/main/u/uw-imap/ipopd_2002edebian1-6_powerpc.deb
libc-client-dev_2002edebian1-6_powerpc.deb
  to pool/main/u/uw-imap/libc-client-dev_2002edebian1-6_powerpc.deb
libc-client2002edebian_2002edebian1-6_powerpc.deb
  to pool/main/u/uw-imap/libc-client2002edebian_2002edebian1-6_powerpc.deb
mlock_2002edebian1-6_powerpc.deb
  to pool/main/u/uw-imap/mlock_2002edebian1-6_powerpc.deb
uw-imap_2002edebian1-6.diff.gz
  to pool/main/u/uw-imap/uw-imap_2002edebian1-6.diff.gz
uw-imap_2002edebian1-6.dsc
  to pool/main/u/uw-imap/uw-imap_2002edebian1-6.dsc
uw-imapd-ssl_2002edebian1-6_all.deb
  to pool/main/u/uw-imap/uw-imapd-ssl_2002edebian1-6_all.deb
uw-imapd_2002edebian1-6_powerpc.deb
  to pool/main/u/uw-imap/uw-imapd_2002edebian1-6_powerpc.deb
uw-mailutils_2002edebian1-6_powerpc.deb
  to pool/main/u/uw-imap/uw-mailutils_2002edebian1-6_powerpc.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonas Smedegaard <[EMAIL PROTECTED]> (supplier of updated uw-imap package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu,  3 Feb 2005 20:22:23 +0100
Source: uw-imap
Binary: libc-client2002edebian uw-imapd libc-client-dev mlock ipopd ipopd-ssl 
uw-imapd-ssl uw-mailutils
Architecture: source all powerpc
Version: 7:2002edebian1-6
Distribution: unstable
Urgency: high
Maintainer: Jonas Smedegaard <[EMAIL PROTECTED]>
Changed-By: Jonas Smedegaard <[EMAIL PROTECTED]>
Description: 
 ipopd      - POP2 and POP3 servers from UW
 ipopd-ssl  - Dummy upgrade package for ipopd
 libc-client-dev - UW c-client library for mail protocols
 libc-client2002edebian - UW c-client library for mail protocols
 mlock      - Mailbox locking program from UW
 uw-imapd   - remote mail folder access server
 uw-imapd-ssl - Dummy upgrade package for uw-imapd
 uw-mailutils - C-client support programs from UW
Closes: 292606 293418
Changes: 
 uw-imap (7:2002edebian1-6) unstable; urgency=high
 .
   * Fix CERT security bug VU#702777: CRAM-MD5 authentication (disabled
     by default in Debian) would always grant access after 4 failed
     attempts. This closes: bug#292606, #293418 (thanks to Tomas Pospisek
     <[EMAIL PROTECTED]> for first reporting it and Martin Schulze
     <[EMAIL PROTECTED]> for providing a patch).
   * Set urgency=high due to above security fix.
   * Update local cdbs snippets:
     + buildinfo.mk: Make it actually work (tie to proper targets).
     + debhelper.mk: Add CDBS_BUILD_DEPENDS.
     + bts.mk: Make a test more quiet.
Files: 
 1033d18ff70d48972a34a9ba9ee6e5e9 771 mail optional uw-imap_2002edebian1-6.dsc
 55432671e26d994dfe8c88c8be4bc214 81715 mail optional 
uw-imap_2002edebian1-6.diff.gz
 c6b008cdd2be460a054baa42ca84efdd 19504 mail optional 
uw-imapd-ssl_2002edebian1-6_all.deb
 8ba960aafc51439676a7771bc76c2a30 19494 mail optional 
ipopd-ssl_2002edebian1-6_all.deb
 78af18326b83e0ece97ed9cb665bcfa5 67932 mail optional 
uw-imapd_2002edebian1-6_powerpc.deb
 d05b4a5a4dfd05344a4cb9609edcf10a 42330 mail optional 
ipopd_2002edebian1-6_powerpc.deb
 00ec85a065ce820a7ad7e817dc460f3a 1367906 libdevel optional 
libc-client-dev_2002edebian1-6_powerpc.deb
 db241d8b61979a5248694c9baa137ff6 583856 libs optional 
libc-client2002edebian_2002edebian1-6_powerpc.deb
 009f3b6eb5269a64b0487cc577a0c3b0 25216 mail optional 
mlock_2002edebian1-6_powerpc.deb
 3eac2a5918c0c04a0b90931136bcec6e 49056 mail optional 
uw-mailutils_2002edebian1-6_powerpc.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFCAoGIn7DbMsAkQLgRAgM8AJ47EY+BSrbuC3w8t6LllFeC8Ns4PwCeJbwf
Ro7+iZABkFuLrVsSxpRARgA=
=YDa9
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to