From owner-freebsd-ports Mon Aug 12 11:32:48 2002 Delivered-To: freebsd-ports@freebsd.org Received: from mx1.FreeBSD.org (mx1.FreeBSD.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 3256737B400; Mon, 12 Aug 2002 11:32:43 -0700 (PDT) Received: from obsidian.sentex.ca (obsidian.sentex.ca [64.7.128.101]) by mx1.FreeBSD.org (Postfix) with ESMTP id 92F5A43E42; Mon, 12 Aug 2002 11:32:42 -0700 (PDT) (envelope-from mike@sentex.net) Received: from simian.sentex.net (pyroxene.sentex.ca [199.212.134.18]) by obsidian.sentex.ca (8.12.5/8.12.5) with ESMTP id g7CIWdmC002770; Mon, 12 Aug 2002 14:32:40 -0400 (EDT) (envelope-from mike@sentex.net) Message-Id: <5.1.1.6.0.20020812142654.0525a938@marble.sentex.ca> X-Sender: mdtpop@marble.sentex.ca X-Mailer: QUALCOMM Windows Eudora Version 5.1.1 Date: Mon, 12 Aug 2002 14:35:44 -0400 To: ports@FreeBSD.org From: Mike Tancsa Subject: hylaxfax security issue (from the ports) Cc: security@FreeBSD.org Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Virus-Scanned: By Sentex Communications (obsidian/20020220) X-Spam-Status: No, hits=1.1 required=7.0 tests=DOUBLE_CAPSWORD version=2.31 X-Spam-Level: * Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Looks like the current version of HylaFax in the ports once again has security issues (remote and local). From the web page http://www.hylafax.org/4.1.3.html 4.1.3 includes fixes for a remote format string vulnerability which could be abused in a denial of service attack. Also fixed is a buffer overflow condition when receiving fax image data which potentially could be exploited to execute arbitrary code as root. Also present in 4.1.3 are fixes for several other local remote format string vulnerabilities which, in some installations, could lead to elevated privileges by abuse. Everyone is advised to upgrade. ------------------------------ I am not a heavy user of HylaFax (only outbound), but removing the two patch files and making the following changes lets it build with the new source code. The md5 is also on the webpage. % diff -u Makefile.old Makefile --- Makefile.old Mon Aug 12 14:25:33 2002 +++ Makefile Mon Aug 12 14:25:47 2002 @@ -6,7 +6,7 @@ # PORTNAME= hylafax -PORTVERSION= 4.1 +PORTVERSION= 4.1.3 PORTREVISION= 1 CATEGORIES= comms MASTER_SITES= ftp://ftp.hylafax.org/source/ % diff -u distinfo.old distinfo --- distinfo.old Mon Aug 12 14:26:37 2002 +++ distinfo Mon Aug 12 14:27:25 2002 @@ -1,4 +1,4 @@ -MD5 (hylafax/hylafax-4.1.3.tar.gz) = d8a60dcddb4bcfd67c494aee89d036e7 +MD5 (hylafax/hylafax-4.1.3.tar.gz) = b3e95810a7fc99685f92faa8ff59114e MD5 (hylafax/tiff-3.5-interfaces.patch) = c1d2847c9967a10961bb7fe123ecd8e6 MD5 (hylafax/cvtDateTime.patch) = 57b2d1218e83504c85cf31c1e3746e4e MD5 (hylafax/rings-cid-passing.patch) = ade1d9adc9dd236e45176b7a0e3b5d78 % ---Mike -------------------------------------------------------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet since 1994 www.sentex.net Cambridge, Ontario Canada www.sentex.net/mike To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message