exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 19226

Secunia Security Advisory 19226
Posted Mar 13, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for metamail. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | ef0fc502337ebb7605160f75bad74c7e0ba186e7cfa5a0dbc907a2ae7e9ae49c

Secunia Security Advisory 19226

Change Mirror Download


TITLE:
Debian update for metamail

SECUNIA ADVISORY ID:
SA19226

VERIFY ADVISORY:
http://secunia.com/advisories/19226/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
Debian GNU/Linux 3.0
http://secunia.com/product/143/

DESCRIPTION:
Debian has issued an update for metamail. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

For more information:
SA18796

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 3.0 alias woody --

Source archives:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4.dsc
Size/MD5 checksum: 613 6ee8aeff0f14e5d799a670fe727039c7
http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4.diff.gz
Size/MD5 checksum: 333628 22588d5a91f53fdc1a6458c5519d2512
http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7.orig.tar.gz
Size/MD5 checksum: 156656 c6967e9bc5d3c919764b02df24efca01

Alpha architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_alpha.deb
Size/MD5 checksum: 166084 a45a36ff283de7cb3ab3e43694f90c45

ARM architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_arm.deb
Size/MD5 checksum: 153404 52e740cb6dbc32c860da10010bb90571

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_i386.deb
Size/MD5 checksum: 150578 4d3e962558adfd7f43859b9f7fd30450

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_ia64.deb
Size/MD5 checksum: 205790 1e9d9f11ca4fbb1863db2e205d808c23

HP Precision architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_hppa.deb
Size/MD5 checksum: 153406 7897b81f6f0ee82abbcf415e258d8c9d

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_m68k.deb
Size/MD5 checksum: 146400 a3cc53e414d0e60e54e4ac92849b4d0d

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_mips.deb
Size/MD5 checksum: 158558 82cd3b0bb263e24f0a6f7c500a01d0af

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_mipsel.deb
Size/MD5 checksum: 158562 b0a037641e1fa292decffa319cf75daf

PowerPC architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_powerpc.deb
Size/MD5 checksum: 148694 f326ccce8fd7cf2445e0f716fcc65143

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_s390.deb
Size/MD5 checksum: 151512 ad0e4e1d1ee73ac300e4f1dc07bcfb5d

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.4_sparc.deb
Size/MD5 checksum: 155492 cf37f006621cbff83fb236afd8bfc223

-- Debian GNU/Linux 3.1 alias sarge --

Source archives:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1.dsc
Size/MD5 checksum: 594 3131f64cf684d62318636b8589acbc94
http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1.diff.gz
Size/MD5 checksum: 340408 165af1d9cff83f10103ebddfdb90f2ad
http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7.orig.tar.gz
Size/MD5 checksum: 156656 c6967e9bc5d3c919764b02df24efca01

Alpha architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_alpha.deb
Size/MD5 checksum: 168190 f31837660b8971eecd951def396c0379

AMD64 architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_amd64.deb
Size/MD5 checksum: 160420 ff733653f1d7df67115d61fa8df86406

ARM architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_arm.deb
Size/MD5 checksum: 154186 937894d91d29082fa76ffea6d54e756f

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_i386.deb
Size/MD5 checksum: 148676 58b08e364eefebe313a6fb6308ed5bf9

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_ia64.deb
Size/MD5 checksum: 198062 fce924b058a6b833bf18f9f2ecbc4456

HP Precision architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_hppa.deb
Size/MD5 checksum: 159538 7bd1f8661de8ef52f7391022a12b023b

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_m68k.deb
Size/MD5 checksum: 148334 03af976c9a4f9e84493b8740ec97d459

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_mips.deb
Size/MD5 checksum: 166488 c228360db9655a46526ae72ff190d170

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_mipsel.deb
Size/MD5 checksum: 166320 120c2c081b45c4d7d90a58e65a11f984

PowerPC architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_powerpc.deb
Size/MD5 checksum: 160878 ada001589f143bbe6215f12507ce6c4c

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_s390.deb
Size/MD5 checksum: 158718 0f70d83bff2a30d8dab1d798072d4157

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-47sarge1_sparc.deb
Size/MD5 checksum: 152086 b4776767e71f5202a4a188d032762b24

-- Debian GNU/Linux unstable alias sid --

Fixed in version 2.7-51.

ORIGINAL ADVISORY:
http://www.debian.org/security/2006/dsa-995

OTHER REFERENCES:
SA18796:
http://secunia.com/advisories/18796/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close