Debian Security Advisory
DSA-534-1 mailreader -- directory traversal
- Date Reported:
- 22 Jul 2004
- Affected Packages:
- mailreader
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 6055.
In Mitre's CVE dictionary: CVE-2002-1581. - More information:
-
A directory traversal vulnerability was discovered in mailreader whereby remote attackers could view arbitrary files with the privileges of the nph-mr.cgi process (by default, www-data) via relative paths and a null byte in the configLanguage parameter.
For the current stable distribution (woody), this problem has been fixed in version 2.3.29-5woody1.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you update your mailreader package.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/m/mailreader/mailreader_2.3.29-5woody1.dsc
- http://security.debian.org/pool/updates/main/m/mailreader/mailreader_2.3.29-5woody1.diff.gz
- http://security.debian.org/pool/updates/main/m/mailreader/mailreader_2.3.29.orig.tar.gz
- http://security.debian.org/pool/updates/main/m/mailreader/mailreader_2.3.29-5woody1.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/m/mailreader/mailreader_2.3.29-5woody1_all.deb
MD5 checksums of the listed files are available in the original advisory.