Skip to navigation

Security Advisory metamail security update

Advisory: RHSA-2006:0217-4
Type: Security Advisory
Severity: Important
Issued on: 2006-02-21
Last updated on: 2006-02-21
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2006-0709

Details

An updated metamail package that fixes a buffer overflow vulnerability for
Red Hat Enterprise Linux 2.1 is now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Metamail is a system for handling multimedia mail.

A buffer overflow bug was found in the way Metamail processes certain mail
messages. An attacker could create a carefully-crafted message such that
when it is opened by a victim and parsed through Metamail, it runs
arbitrary code as the victim. The Common Vulnerabilities and Exposures
project (cve.mitre.org) assigned the name CVE-2006-0709 to this issue.

Users of Metamail should upgrade to this updated package, which contains a
backported patch that is not vulnerable to this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/metamail/2.7-30/SRPMS/metamail-2.7-30.src.rpm
Missing file
    MD5: 0d9e11b28157bcf5f1da1a99513b59fa
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/metamail/2.7-30/i386/metamail-2.7-30.i386.rpm
Missing file
    MD5: f0b370477bbae8a72eb5d9211b3b2313
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/metamail/2.7-30/ia64/metamail-2.7-30.ia64.rpm
Missing file
    MD5: 8ee8c235fed4fd06e629803e4f414ba3
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/metamail/2.7-30/SRPMS/metamail-2.7-30.src.rpm
Missing file
    MD5: 0d9e11b28157bcf5f1da1a99513b59fa
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/metamail/2.7-30/i386/metamail-2.7-30.i386.rpm
Missing file
    MD5: f0b370477bbae8a72eb5d9211b3b2313
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/metamail/2.7-30/SRPMS/metamail-2.7-30.src.rpm
Missing file
    MD5: 0d9e11b28157bcf5f1da1a99513b59fa
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/metamail/2.7-30/i386/metamail-2.7-30.i386.rpm
Missing file
    MD5: f0b370477bbae8a72eb5d9211b3b2313
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/metamail/2.7-30/SRPMS/metamail-2.7-30.src.rpm
Missing file
    MD5: 0d9e11b28157bcf5f1da1a99513b59fa
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/metamail/2.7-30/ia64/metamail-2.7-30.ia64.rpm
Missing file
    MD5: 8ee8c235fed4fd06e629803e4f414ba3
 

Bugs fixed (see bugzilla for more information)

181665 - CVE-2006-0709 Metamail heap based buffer overflow


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/