Debian Linux nmh 远程漏洞
发布日期:2000-02-29
更新日期:2000-02-29
受影响系统:nmh_0.27-0.28-pre8-4以前版本
+
-Debian GNU/Linux 2.1
描述:
Debian GNU/Linux 2.1发布中所带的nmh软件没有正确检查收到邮件的内容。因此攻击
者可以通过设计一个特别的MIME格式头来欺骗mhshow,让它执行任意代码。
<* 来源:Debian Security Advisory security@debian.org
http://www.debian.org/security/ Wichert Akkerman
*>
建议:
nmh 0.27-0.28-pre8-4版已经修复了这个漏洞。您可以在下列地址得到新的软件包:
Debian GNU/Linux 2.1 alias slink
---------------------------------
目前只提供了对Intel ia32, Motorola 680x0, alpha 和 Sun sparc 的版本
Source archives:
http://security.debian.org/dists/stable/updates/source/nmh_0.27-0.28-pre8-4.diff.gz
MD5 checksum: e067ed67134efa5f3e0e2ed8ff70ebb3
http://security.debian.org/dists/stable/updates/source/nmh_0.27-0.28-pre8-4.dsc
MD5 checksum: 311c7fa22aa6ff3e0911f363d83f1260
http://security.debian.org/dists/stable/updates/source/nmh_0.27-0.28-pre8.orig.tar.gz
MD5 checksum: cb8af772beccf3432184ffe71cd9f39c
Alpha architecture:
http://security.debian.org/dists/stable/updates/binary-alpha/nmh_0.27-0.28-pre8-4_alpha.deb
MD5 checksum: d3fdfb597a3c6be024481a8d17ae8882
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/binary-i386/nmh_0.27-0.28-pre8-4_i386.deb
MD5 checksum: a5e06258dfdfc38069597047acdc7c5f
Motorola 680x0 architecture:
http://security.debian.org/dists/stable/updates/binary-m68k/nmh_0.27-0.28-pre8-4_m68k.deb
MD5 checksum: d6c522f5cbf32a266a593d66570b9be0
Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/binary-sparc/nmh_0.27-0.28-pre8-4_sparc.deb
MD5 checksum: 6a912720d4a206ae39f9408a57e448bc
These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
wget url 用来下载软件
dpkg -i file.deb 用来安装相关文件
浏览次数:7171
严重程度:0(网友投票)