Your message dated Tue, 10 Jan 2006 19:31:28 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Bug#347298: Security concern in notify script CVE-2005-3539
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 9 Jan 2006 22:43:59 +0000
>From [EMAIL PROTECTED] Mon Jan 09 14:43:59 2006
Return-path: <[EMAIL PROTECTED]>
Received: from dsl234-165-100.fastxdsl.nl ([80.100.165.234] helo=mailfrom.nl)
        by spohr.debian.org with esmtp (Exim 4.50)
        id 1Ew5aG-000831-9L
        for [EMAIL PROTECTED]; Mon, 09 Jan 2006 14:33:48 -0800
Received: from ernst by mailfrom.nl with local (Exim 4.50)
        id 1Ew5aD-0001G4-Bu
        for [EMAIL PROTECTED]; Mon, 09 Jan 2006 23:33:45 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Ernst Oudhof <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: hylafax-server: Security concern in notify script CVE-2005-3539
X-Mailer: reportbug 3.8
Date: Mon, 09 Jan 2006 23:33:45 +0100
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: hylafax-server
Version: 1:4.2.1-5sarge1
Severity: grave
Tags: security
Justification: user security hole


Hi,

An eval injection vulnerability was found in Hylafax 4.2.0 to 4.2.3
which allows an remote attacker to execute arbitrary commands.
this issue is described in candidate CVE-2005-3539
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3539
As debian stable is using 4.2.1 it is not vulnarable to the issue in the
faxrcvd script.

regards,

Ernst Oudhof



-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-k7
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages hylafax-server depends on:
ii  debconf          1.4.30.13               Debian configuration management sy
ii  gawk [awk]       1:3.1.4-2               GNU awk, a pattern scanning and pr
ii  gs               8.01-5                  Transitional package
ii  gs-gpl [gs]      8.01-5                  The GPL Ghostscript PostScript int
ii  hylafax-client   1:4.2.1-5sarge1         Flexible client/server fax softwar
ii  libc6            2.3.2.ds1-22            GNU C Library: Shared libraries an
ii  libgcc1          1:3.4.3-13              GCC support library
ii  libpam0g         0.76-22                 Pluggable Authentication Modules l
ii  libstdc++5       1:3.3.5-13              The GNU Standard C++ Library v3
ii  libtiff-tools    3.7.2-3                 TIFF manipulation and conversion t
ii  libtiff4         3.7.2-3                 Tag Image File Format (TIFF) libra
ii  mailx            1:8.1.2-0.20040524cvs-4 A simple mail user agent
ii  mawk [awk]       1.3.3-11                a pattern scanning and text proces
ii  mime-codecs      7.19-4                  Fast Quoted-Printable and BASE64 M
ii  psmisc           21.5-1                  Utilities that use the proc filesy
ii  sed              4.1.2-8                 The GNU sed stream editor
ii  zlib1g           1:1.2.2-4.sarge.2       compression library - runtime

-- debconf information excluded

---------------------------------------
Received: (at 347298-done) by bugs.debian.org; 10 Jan 2006 18:32:01 +0000
>From [EMAIL PROTECTED] Tue Jan 10 10:32:01 2006
Return-path: <[EMAIL PROTECTED]>
Received: from vsmtp12.tin.it ([212.216.176.206])
        by spohr.debian.org with esmtp (Exim 4.50)
        id 1EwOHp-0005aA-3z; Tue, 10 Jan 2006 10:32:01 -0800
Received: from casa (87.0.208.45) by vsmtp12.tin.it (7.2.060.1) (authenticated 
as [EMAIL PROTECTED])
        id 43B76222004775FE; Tue, 10 Jan 2006 19:31:36 +0100
Received: from localhost ([127.0.0.1])
        by casa with esmtpa (Exim 4.50)
        id 1EwOHJ-00046U-3a; Tue, 10 Jan 2006 19:31:29 +0100
Message-ID: <[EMAIL PROTECTED]>
Date: Tue, 10 Jan 2006 19:31:28 +0100
From: Giuseppe Sacco <[EMAIL PROTECTED]>
User-Agent: Mozilla Thunderbird 1.0.2 (X11/20051002)
X-Accept-Language: it, it-it, en-us, en
MIME-Version: 1.0
To: [EMAIL PROTECTED],  [EMAIL PROTECTED]
Subject: Re: Bug#347298: Security concern in notify script CVE-2005-3539
References: <[EMAIL PROTECTED]>
In-Reply-To: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-10.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER,
        HAS_PACKAGE,RCVD_IN_SORBS autolearn=ham 
        version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Package: hylafax-server
Version: 1:4.2.1-5sarge3

Hi Ernst,
thanks for your report and your patch. A new hylafax version was already 
prepared with the Debian Security Team. This new package version has 
been released yesterday.

I am closing this bug report since the problem has been already fixed.

Bye,
Giuseppe


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to