[30346] in bugtraq
Immunix Secured OS 7+ file update
daemon@ATHENA.MIT.EDU (Immunix Security Team)
Wed Jun 4 12:19:25 2003
Date: Tue, 3 Jun 2003 18:13:19 -0700
From: Immunix Security Team <security@immunix.com>
To: bugtraq@securityfocus.com
Message-ID: <20030604011319.GG5506@wirex.com>
Mail-Followup-To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="B8ONY/mu/bqBak9m"
Content-Disposition: inline
--B8ONY/mu/bqBak9m
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
-----------------------------------------------------------------------
Immunix Secured OS Security Advisory
Packages updated: file
Affected products: Immunix OS 7+
Bugs fixed: CAN-2003-0102
Date: Tue Jun 3 2003
Advisory ID: IMNX-2003-7+-012-01
Author: Seth Arnold <sarnold@wirex.com>
-----------------------------------------------------------------------
Description:
An anonymous reporter has reported to iDEFENSE a vulnerability in file
that could allow for a root compromise, should root run file on a
specially crafted file. This is a local exploit, and requires a user
to run "file" on potentially untrusted files.
This release fixes this vulnerability, and adds a newer magic
databased.
References: http://www.securityfocus.com/archive/1/313837
Package names and locations:
Precompiled binary packages for Immunix 7+ are available at:
http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/file-3.30-7_imnx_3.=
41_1.i386.rpm
Immunix OS 7+ md5sums:
bea08bde8952bb723993ad6dd8f5e188 RPMS/file-3.30-7_imnx_3.41_1.i386.rpm
GPG verification: =
=20
Our public key is available at <http://wirex.com/security/GPG_KEY>. =
=20
NOTE:
Ibiblio is graciously mirroring our updates, so if the links above are
slow, please try:
ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
or one of the many mirrors available at:
http://www.ibiblio.org/pub/Linux/MIRRORS.html
ImmunixOS 6.2 is no longer officially supported.
ImmunixOS 7.0 is no longer officially supported.
Contact information:
To report vulnerabilities, please contact security@wirex.com. WireX=20
attempts to conform to the RFP vulnerability disclosure protocol
<http://www.wiretrip.net/rfp/policy.html>.
--B8ONY/mu/bqBak9m
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAj7dR64ACgkQVQcWL60UVMu7mACfa6+2oVXO2hhpwm5KBcOsssNK
Pu4AoJj3QPdtHdh1i971mHcHf4+99hH+
=QEuP
-----END PGP SIGNATURE-----
--B8ONY/mu/bqBak9m--