exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Linux Security Advisory 889-1

Debian Linux Security Advisory 889-1
Posted Nov 9, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 889-1 - A bug has been discovered in enigmail, GPG support for Mozilla MailNews and Mozilla Thunderbird, that can lead to the encryption of mail with the wrong public key, hence, potential disclosure of confidential data to others.

tags | advisory
systems | linux, debian
advisories | CVE-2005-3256
SHA-256 | 4be675ece4a4d67f879b5d40f664546958c95aef39d098d00d59abee0a458ae7

Debian Linux Security Advisory 889-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 889-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
November 8th, 2005 http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : enigmail
Vulnerability : programming error
Problem type : local (remote)
Debian-specific: no
CVE ID : CAN-2005-3256
CERT advisory : VU#805121
Debian Bug : 335731

A bug has been discovered in enigmail, GPG support for Mozilla
MailNews and Mozilla Thunderbird, that can lead to the encryption of
mail with the wrong public key, hence, potential disclosure of
confidential data to others.

The old stable distribution (woody) does not contain enigmail packages.

For the stable distribution (sarge) this problem has been fixed in
version 0.91-4sarge2.

For the unstable distribution (sid) this problem has been fixed in
version 0.93-1.

We recommend that you upgrade your enigmail packages.


Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/e/enigmail/enigmail_0.91-4sarge2.dsc
Size/MD5 checksum: 876 75a0758ff71b8651e26cb3d16320cb04
http://security.debian.org/pool/updates/main/e/enigmail/enigmail_0.91-4sarge2.diff.gz
Size/MD5 checksum: 17190 9d19e21a4feaf5177216646635949398
http://security.debian.org/pool/updates/main/e/enigmail/enigmail_0.91.orig.tar.gz
Size/MD5 checksum: 2027147 b802d62ea602d82d8d0c69cc807bf83a

Alpha architecture:

http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_alpha.deb
Size/MD5 checksum: 345752 818ab632bcb4ea7e8b4105086aa2b904
http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_alpha.deb
Size/MD5 checksum: 350004 5087cf1624f2d70c5f0a543604556596

AMD64 architecture:

http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_amd64.deb
Size/MD5 checksum: 314392 f9f5d14e6e0d000cfc3394ecdd6115d7
http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_amd64.deb
Size/MD5 checksum: 318672 d9fe5cf1c8c747e2c750f4687115f735

ARM architecture:

http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_arm.deb
Size/MD5 checksum: 301182 0f7100552d152f8018726349de1bade3
http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_arm.deb
Size/MD5 checksum: 306332 cd5027429531a8c3b87d9a2c5e8aaaab

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_i386.deb
Size/MD5 checksum: 298752 1ab5eee62ddb846a74441bc50d0120cf
http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_i386.deb
Size/MD5 checksum: 304076 eb8586436db24bf342f69b1d3996c37e

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_ia64.deb
Size/MD5 checksum: 360432 cff589e212e6852048c65121be50e06c
http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_ia64.deb
Size/MD5 checksum: 365434 f5571495756e2b8a72bf609bf2e73824

HP Precision architecture:

http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_hppa.deb
Size/MD5 checksum: 321090 c2038c3d7274addf7387790275d668a1
http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_hppa.deb
Size/MD5 checksum: 325354 c285ed213fc3a9cc62bbe2c0ac84ca2e

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_m68k.deb
Size/MD5 checksum: 299930 6f45c5101ae36faa4bef8f4bfb5dedaa
http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_m68k.deb
Size/MD5 checksum: 305212 aade8a0d36c5205034c845fa803c230f

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_mips.deb
Size/MD5 checksum: 308046 11eec39a832de3fe90794a5958044678
http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_mips.deb
Size/MD5 checksum: 313148 358aa614e2b4fb330a162b6bdd8a19b7

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_mipsel.deb
Size/MD5 checksum: 307274 5fa7f930926d0fdf8e60d86eda6c6579
http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_mipsel.deb
Size/MD5 checksum: 312344 98db4ceb10b7848d8e58c83a8a02e968

PowerPC architecture:

http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_powerpc.deb
Size/MD5 checksum: 300700 ee25b159b35a02b6d1e5f45212d6dae7
http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_powerpc.deb
Size/MD5 checksum: 305824 6fbe747eb1eb09f56e634c6f9f21cef8

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_s390.deb
Size/MD5 checksum: 322512 1dbfe3be09e79091a5f01ae7f0b251a2
http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_s390.deb
Size/MD5 checksum: 327176 a3a75f4c3782ed0e6e7fdb881e753661

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/e/enigmail/mozilla-enigmail_0.91-4sarge2_sparc.deb
Size/MD5 checksum: 299788 009c91ff056a4b6a3bf9adc5a3425335
http://security.debian.org/pool/updates/main/e/enigmail/mozilla-thunderbird-enigmail_0.91-4sarge2_sparc.deb
Size/MD5 checksum: 304074 a6fb00b36e7d52d91a136327928338c9


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDcElDW5ql+IAeqTIRAvhiAKCWBcDVjwjI7fsMUdGWzR+v7r4R+wCfVbr1
62hrrDtJEhQT9SzSOaGVuJo=
=Q5yZ
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close