From owner-freebsd-announce Sun Mar 19 22:31:54 2000 Delivered-To: freebsd-announce@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 758) id 8E1A037B528; Sun, 19 Mar 2000 22:31:45 -0800 (PST) From: FreeBSD Security Officer Subject: FreeBSD Security Advisory: FreeBSD-SA-00:07.mh [REVISED] Reply-To: security-officer@freebsd.org From: FreeBSD Security Officer Message-Id: <20000320063145.8E1A037B528@hub.freebsd.org> Date: Sun, 19 Mar 2000 22:31:45 -0800 (PST) Sender: owner-freebsd-announce@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org -----BEGIN PGP SIGNED MESSAGE----- ============================================================================= FreeBSD-SA-00:07 Security Advisory FreeBSD, Inc. Topic: mh/nmh/exmh/exmh2 ports allow remote execution of binary code Category: ports Module: mh/nmh/exmh/exmh2 Announced: 2000-03-15 Revised: 2000-03-19 Affects: Ports collection before the correction date. Corrected: [See below for a more complete description] All versions fixed in 4.0-RELEASE. mh: 2000-03-04 nmh: 2000-02-29 exmh: 2000-03-05 exmh2: 2000-03-05 FreeBSD only: NO I. Background MH and its successor NMH are popular Mail User Agents. EXMH and EXMH2 are TCL/TK-based front-ends to the MH system. There are also Japanese-language versions of the MH and EXMH2 ports, but these are developed separately and are not vulnerable to the problem described here. II. Problem Description The mhshow command used for viewing MIME attachments contains a buffer overflow which can be exploited by a specially-crafted email attachment, which will allow the execution of arbitrary code as the local user when the attachment is opened. The *MH ports are not installed by default, nor are they "part of FreeBSD" as such: they are part of the FreeBSD ports collection, which contains over 3100 third-party applications in a ready-to-install format. The FreeBSD 4.0-RELEASE ports collection is not vulnerable to this problem. FreeBSD makes no claim about the security of these third-party applications, although an effort is underway to provide a security audit of the most security-critical ports. III. Impact An attacker who can convince a user to open a hostile MIME attachment sent as part of an email message can execute arbitrary binary code running with the privileges of that user. If you have not chosen to install any of the mh/nmh/exmh/exmh2 ports/packages, then your system is not vulnerable. The Japanese-language version of MH is being actively developed and is believed to have fixed this particular problem over a year ago. Consequently the ja-mh and ja-exmh2 ports are not believed to be vulnerable to this problem. IV. Workaround 1) Remove the mhshow binary, located in /usr/local/bin/mhshow. This will prevent the viewing of MIME attachments from within *mh. 2) Remove the mh/nmh/exmh/exmh2 ports, if you you have installed them. V. Solution The English language version of the MH software is no longer actively developed, and no fix is currently available. It is unknown whether a fix to the problem will be forthcoming - consider upgrading to use NMH instead, which is the designated successor of the MH software. EXMH and EXMH2 can both be compiled to use NMH instead (this is now the default behaviour). It is not necessary to recompile EXMH/EXMH2 after reinstalling NMH. SOLUTION: Remove any old versions of the mail/mh or mail/nmh ports and perform one of the following: 1) Upgrade your entire ports collection and rebuild the mail/nmh port. 2) Reinstall a new package obtained from: ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/mail/nmh-1.0.3.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-current/mail/nmh-1.0.3.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-current/mail/nmh-1.0.3.tgz 3) download a new port skeleton for the nmh port from: http://www.freebsd.org/ports/ and use it to rebuild the port. 4) Use the portcheckout utility to automate option (3) above. The portcheckout port is available in /usr/ports/devel/portcheckout or the package can be obtained from: ftp://ftp.freebsd.org/pub/FreeBSD/ports/packages/devel/portcheckout-1.0.tgz VI. Revision history v1.0 2000-03-15 Initial release v1.1 2000-03-19 Update to note that the japanese-localized ports are not vulnerable -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBONXFXlUuHi5z0oilAQHQ/QP9FCTFiFlaeSv2ROM46PbDkF6MN39SLTuv DEW6a6wmMU5+YbSTlFLjvYrqYgpjOmM7NMOMhhceVVpoZVMMPonHuJxHWh7YvF2G T4bZcRM3kpRcjXAOQnIiUrgh77zoEmfBysAmHZbNucCmOB5y7UqHI3CM31+geiPR /bsvHCy4U0U= =Odcg -----END PGP SIGNATURE----- This is the moderated mailing list freebsd-announce. The list contains announcements of new FreeBSD capabilities, important events and project milestones. See also the FreeBSD Web pages at http://www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-announce" in the body of the message From owner-freebsd-announce Tue Mar 21 0:55:46 2000 Delivered-To: freebsd-announce@freebsd.org Received: from zippy.cdrom.com (zippy.cdrom.com [204.216.27.228]) by hub.freebsd.org (Postfix) with ESMTP id 3968037B809; Tue, 21 Mar 2000 00:55:39 -0800 (PST) (envelope-from jkh@zippy.cdrom.com) Received: from zippy.cdrom.com (jkh@localhost [127.0.0.1]) by zippy.cdrom.com (8.9.3/8.9.3) with ESMTP id AAA30537; Tue, 21 Mar 2000 00:56:06 -0800 (PST) (envelope-from jkh@zippy.cdrom.com) To: announce@freebsd.org Cc: committers@freebsd.org Subject: 4.0-RELEASE updated on ftp.freebsd.org and ISO images on the way. Date: Tue, 21 Mar 2000 00:56:06 -0800 Message-ID: <30534.953628966@zippy.cdrom.com> From: "Jordan K. Hubbard" Sender: owner-freebsd-announce@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org A number of last-minute issues, like two devices on a single IDE channel failing to operate, were resolved and merited a re-roll of the 4.0-RELEASE distribution. Both the i386 and alpha releases were re-transferred to ftp.freebsd.org earlier this afternoon and should be pushed out to most of the mirrors by now. There should otherwise be no user-visible changes; various things will simply work where they might have failed before. :) The ISO images are still uploading but should be available by March 21st, 13:00 GMT. Once they're finished downloading, they'll be readable at the location referenced in the previous announcement (ftp://ftp.freebsd.org/pub/FreeBSD/releases/${ARCH}/ISO-IMAGES/). If you see the permissions still set to 0700, they're not quite there yet. Thanks for your patience and your feedback; re-rolling 4.0-RELEASE is not an action I took lightly or intend to repeat, so please make sure you have the latest version before submitting bug reports against 4.0. Anyone grabbing the ISO images or ordering the product on CDROM will also get the latest version and can essentially disregard this notice. Thanks, - Jordan This is the moderated mailing list freebsd-announce. The list contains announcements of new FreeBSD capabilities, important events and project milestones. See also the FreeBSD Web pages at http://www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-announce" in the body of the message