Debian Security Advisory

DSA-534-1 mailreader -- directory traversal

Date Reported:
22 Jul 2004
Affected Packages:
mailreader
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 6055.
In Mitre's CVE dictionary: CVE-2002-1581.
More information:

A directory traversal vulnerability was discovered in mailreader whereby remote attackers could view arbitrary files with the privileges of the nph-mr.cgi process (by default, www-data) via relative paths and a null byte in the configLanguage parameter.

For the current stable distribution (woody), this problem has been fixed in version 2.3.29-5woody1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you update your mailreader package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/m/mailreader/mailreader_2.3.29-5woody1.dsc
http://security.debian.org/pool/updates/main/m/mailreader/mailreader_2.3.29-5woody1.diff.gz
http://security.debian.org/pool/updates/main/m/mailreader/mailreader_2.3.29.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/m/mailreader/mailreader_2.3.29-5woody1_all.deb

MD5 checksums of the listed files are available in the original advisory.