Home > Security > Advisories


Mandriva Advisories

Package name pine
Date November 27th, 2000
Advisory ID MDKSA-2000:073-1
Affected versions 6.0, 6.1, 7.0, 7.1, 7.2
Synopsis Updated description of pine vulnerabilities

Problem Description

By adding specific headers to messages, the pine mail reader could be
made to exit with an error message when users attempted to manipulate
mail folders containing those messages.


The previous announcement did not make mention of another vulnerability
in pine 4.21 and previous in that it also contains a buffer overflow
vulnerability which allows a remote user to execute arbitrary code on
the local client by the sending of a specially-crafted email message.
The overflow occurs during the periodic "new mail" checking of an open

Updated Packages

Mandrakelinux 6.0

 6102f60e5c1847d48e713cd197476c48  6.0/RPMS/pine-4.30-3.3mdk.i586.rpm
b19397fda44d4b23d2824fc2245ebc53  6.0/SRPMS/pine-4.30-3.3mdk.src.rpm

Mandrakelinux 6.1

 94903ad5ac00ffda41d521160d32a40b  6.1/RPMS/pine-4.30-3.3mdk.i586.rpm
b19397fda44d4b23d2824fc2245ebc53  6.1/SRPMS/pine-4.30-3.3mdk.src.rpm

Mandrakelinux 7.0

 5b902033b3fed2434903db3b92132540  7.0/RPMS/pine-4.30-3.3mdk.i586.rpm
b19397fda44d4b23d2824fc2245ebc53  7.0/SRPMS/pine-4.30-3.3mdk.src.rpm

Mandrakelinux 7.1

 caf4defdd635fa882b35c16b0f556683  7.1/RPMS/pine-4.30-3.2mdk.i586.rpm
95a4a83fe3c602f9fc1416eff107952c  7.1/SRPMS/pine-4.30-3.2mdk.src.rpm

Mandrakelinux 7.2

 4213c046974d17cbce020814636de281  7.2/RPMS/pine-4.30-3.1mdk.i586.rpm
eb24c5cc0c4878206b19c1f459831f39  7.2/SRPMS/pine-4.30-3.1mdk.src.rpm


To upgrade automatically, use MandrivaUpdate.


Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.