exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-167

Mandriva Linux Security Advisory 2010-167
Posted Sep 1, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-167 - lwp-download in libwww-perl before 5.835 does not reject downloads to filenames that begin with a. character, which allows remote servers to create or overwrite files via a 3xx redirect to a URL with a crafted filename or a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.

tags | advisory, remote, arbitrary, perl
systems | linux, mandriva
advisories | CVE-2010-2253
SHA-256 | 74795e4d17810b910f6c05d27cb6c8f960f3cfee14bfdfcc1271393daac67a27

Mandriva Linux Security Advisory 2010-167

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:167
http://www.mandriva.com/security/
_______________________________________________________________________

Package : perl-libwww-perl
Date : August 31, 2010
Affected: 2008.0, 2009.0, 2009.1, 2010.0, 2010.1, Corporate 4.0,
Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in perl-libwww-perl:

lwp-download in libwww-perl before 5.835 does not reject downloads to
filenames that begin with a . (dot) character, which allows remote
servers to create or overwrite files via (1) a 3xx redirect to a
URL with a crafted filename or (2) a Content-Disposition header
that suggests a crafted filename, and possibly execute arbitrary
code as a consequence of writing to a dotfile in a home directory
(CVE-2010-2253).

Packages for 2008.0 and 2009.0 are provided as of the Extended
Maintenance Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2253
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
eb58e07ee5e9524b4e57452a643dbf71 2008.0/i586/perl-libwww-perl-5.808-1.1mdv2008.0.noarch.rpm
e6f59be4324272eab54259cb28af54b3 2008.0/SRPMS/perl-libwww-perl-5.808-1.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
6303498f403be5a428c71c6f36b78aeb 2008.0/x86_64/perl-libwww-perl-5.808-1.1mdv2008.0.noarch.rpm
e6f59be4324272eab54259cb28af54b3 2008.0/SRPMS/perl-libwww-perl-5.808-1.1mdv2008.0.src.rpm

Mandriva Linux 2009.0:
22c5170f3d9a1eb3a339aaefe380e426 2009.0/i586/perl-libwww-perl-5.814-2.1mdv2009.0.noarch.rpm
dad05da789801ebbd3439b743cde18bb 2009.0/SRPMS/perl-libwww-perl-5.814-2.1mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
2ee77cc793060c901028a50e9e4bb1c3 2009.0/x86_64/perl-libwww-perl-5.814-2.1mdv2009.0.noarch.rpm
dad05da789801ebbd3439b743cde18bb 2009.0/SRPMS/perl-libwww-perl-5.814-2.1mdv2009.0.src.rpm

Mandriva Linux 2009.1:
9c2e22922cfa40c6c6c8d0d082ea519c 2009.1/i586/perl-libwww-perl-5.825-1.1mdv2009.1.noarch.rpm
735ea6da636354d6a968d0e9ffc9e6ea 2009.1/SRPMS/perl-libwww-perl-5.825-1.1mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
0766b91c7129d7602a0cb335880860c8 2009.1/x86_64/perl-libwww-perl-5.825-1.1mdv2009.1.noarch.rpm
735ea6da636354d6a968d0e9ffc9e6ea 2009.1/SRPMS/perl-libwww-perl-5.825-1.1mdv2009.1.src.rpm

Mandriva Linux 2010.0:
4a2bea6bf8fe36033a1eb2cddefd00d0 2010.0/i586/perl-libwww-perl-5.832.0-1.1mdv2010.0.noarch.rpm
f0a29fd25aeea8046658aba6a25af0e1 2010.0/SRPMS/perl-libwww-perl-5.832.0-1.1mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
3937dc8b11ee88d19dda2934e35cdc11 2010.0/x86_64/perl-libwww-perl-5.832.0-1.1mdv2010.0.noarch.rpm
f0a29fd25aeea8046658aba6a25af0e1 2010.0/SRPMS/perl-libwww-perl-5.832.0-1.1mdv2010.0.src.rpm

Mandriva Linux 2010.1:
ec0d990eeeaf20968899e20b79ed6864 2010.1/i586/perl-libwww-perl-5.834.0-1.1mdv2010.1.noarch.rpm
f4f7832e481d61d2850ddcc4c9182589 2010.1/SRPMS/perl-libwww-perl-5.834.0-1.1mdv2010.1.src.rpm

Mandriva Linux 2010.1/X86_64:
5c5fc935dbca230889195aa8faf28116 2010.1/x86_64/perl-libwww-perl-5.834.0-1.1mdv2010.1.noarch.rpm
f4f7832e481d61d2850ddcc4c9182589 2010.1/SRPMS/perl-libwww-perl-5.834.0-1.1mdv2010.1.src.rpm

Corporate 4.0:
a7379df4aa16235cc17c196376833a4b corporate/4.0/i586/perl-libwww-perl-5.805-2.1.20060mlcs4.noarch.rpm
b9a7b0dba8d66ab52ea1a524d75066d1 corporate/4.0/SRPMS/perl-libwww-perl-5.805-2.1.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
e9cb360bccd55a54007f4e3b5c14c6f9 corporate/4.0/x86_64/perl-libwww-perl-5.805-2.1.20060mlcs4.noarch.rpm
b9a7b0dba8d66ab52ea1a524d75066d1 corporate/4.0/SRPMS/perl-libwww-perl-5.805-2.1.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
6baff2d35be959b597d8d74654626e70 mes5/i586/perl-libwww-perl-5.814-2.1mdvmes5.1.noarch.rpm
e50b3e6c5f89aa0309cbdf27e39f335e mes5/SRPMS/perl-libwww-perl-5.814-2.1mdvmes5.1.src.rpm

Mandriva Enterprise Server 5/X86_64:
c60c8f26245abd71bfa80d5d1a967aab mes5/x86_64/perl-libwww-perl-5.814-2.1mdvmes5.1.noarch.rpm
e50b3e6c5f89aa0309cbdf27e39f335e mes5/SRPMS/perl-libwww-perl-5.814-2.1mdvmes5.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFMfVzGmqjQ0CJFipgRAmvGAKC+DBBYMM6BaHvS++p09hiAylQ/iACg61ME
/s16NAOwjOnKFLASiOScCzE=
=P0QZ
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close