Advisories
Mandriva Advisories
|
![]() |
Problem Description |
During a code review of the hfaxd server, part of the hylafax
package, the SuSE Security Team discovered a format bug condition
that allows remote attackers to execute arbitrary code as the root
user. Updated packages have been patched to correct the problem.
Updated Packages |
Mandrakelinux 9.0
6d801bc4ac6bd340b182108a922968ad 9.0/RPMS/hylafax-4.1.3-5.1.90mdk.i586.rpm 9ccbba7f9fe20e0e3c6151229cca6199 9.0/RPMS/hylafax-client-4.1.3-5.1.90mdk.i586.rpm 60fb31c8a0275475e09be002dfd86285 9.0/RPMS/hylafax-server-4.1.3-5.1.90mdk.i586.rpm 2a3608cf7a7743d6164c575b9dadb8b8 9.0/RPMS/libhylafax4.1.1-4.1.3-5.1.90mdk.i586.rpm d7dc0df22dc192903e190c27c094e81d 9.0/RPMS/libhylafax4.1.1-devel-4.1.3-5.1.90mdk.i586.rpm f1b9526f6a51738dc4fa2d6927dc6c8f 9.0/SRPMS/hylafax-4.1.3-5.1.90mdk.src.rpm
Mandrakelinux 9.1
780b008e39507fba91211231fa82da28 9.1/RPMS/hylafax-4.1.5-1.1.91mdk.i586.rpm 4c911ae821a6937a8405a848564f98b2 9.1/RPMS/hylafax-client-4.1.5-1.1.91mdk.i586.rpm 79e1de48e2be5aa3cd3f0223a7dbb4ce 9.1/RPMS/hylafax-server-4.1.5-1.1.91mdk.i586.rpm adc0f78e0202b6d520658c11fb090fdd 9.1/RPMS/libhylafax4.1.1-4.1.5-1.1.91mdk.i586.rpm 4f93697bd00bfcd16b7e9e866a7a1ca2 9.1/RPMS/libhylafax4.1.1-devel-4.1.5-1.1.91mdk.i586.rpm 168bb1b208ca168728ce5890d6bc9148 9.1/SRPMS/hylafax-4.1.5-1.1.91mdk.src.rpm
Mandrakelinux 9.2
1a834e39a54a3d047f456fb975ceecd3 9.2/RPMS/hylafax-4.1.6-3.1.92mdk.i586.rpm a7e0549c31d187995b2a2d4e08a80c79 9.2/RPMS/hylafax-client-4.1.6-3.1.92mdk.i586.rpm adbaa2999118bcef1454d1cc9741f70c 9.2/RPMS/hylafax-server-4.1.6-3.1.92mdk.i586.rpm 652f6452f70c6c64ad50afe9ce0ffb86 9.2/RPMS/libhylafax4.1.1-4.1.6-3.1.92mdk.i586.rpm 63b11bab4396db5e955e5fcd7787398a 9.2/RPMS/libhylafax4.1.1-devel-4.1.6-3.1.92mdk.i586.rpm 4355fa8ef700fb2284d636fe02a762a4 9.2/SRPMS/hylafax-4.1.6-3.1.92mdk.src.rpm
Corporate Server 2.1
5276f1258c15247e1349b25b74e04bce corporate/2.1/RPMS/hylafax-4.1.3-5.1.C21mdk.i586.rpm df41ac36f154bc7b5b4c999bb1d77cfd corporate/2.1/RPMS/hylafax-client-4.1.3-5.1.C21mdk.i586.rpm 27d38e72f4f9c0536078e9739d8aa525 corporate/2.1/RPMS/hylafax-server-4.1.3-5.1.C21mdk.i586.rpm b5a196bafef616b480aee94ced1cfeca corporate/2.1/RPMS/libhylafax4.1.1-4.1.3-5.1.C21mdk.i586.rpm e735316dd89d83679273583117eafefc corporate/2.1/RPMS/libhylafax4.1.1-devel-4.1.3-5.1.C21mdk.i586.rpm a417945a8f4c88d216060e53484e1342 corporate/2.1/SRPMS/hylafax-4.1.3-5.1.C21mdk.src.rpm
Corporate Server 2.1/X86_64
8e2d216e6e706570416d7713a8a5d5b9 x86_64/corporate/2.1/RPMS/hylafax-4.1.3-5.1.C21mdk.x86_64.rpm 9a4733e46d35cc1889c0ed5f7db5d0d5 x86_64/corporate/2.1/RPMS/hylafax-client-4.1.3-5.1.C21mdk.x86_64.rpm da70df4e2cf2c95edc7a926cf62c5934 x86_64/corporate/2.1/RPMS/hylafax-server-4.1.3-5.1.C21mdk.x86_64.rpm 7c63ef78fab0c214134a899bb6b01165 x86_64/corporate/2.1/RPMS/libhylafax4.1.1-4.1.3-5.1.C21mdk.x86_64.rpm ea47f2c922153e969177569c81a88fe3 x86_64/corporate/2.1/RPMS/libhylafax4.1.1-devel-4.1.3-5.1.C21mdk.x86_64.rpm a417945a8f4c88d216060e53484e1342 x86_64/corporate/2.1/SRPMS/hylafax-4.1.3-5.1.C21mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0886
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.