Debian Project

Debian testing security team - Advisory

DTSA-11-1

Date Reported:
August 29th, 2005
Affected Package:
maildrop
Vulnerability:
local privilege escalation
Problem-Scope:
local
Debian-specific:
Yes
CVE:
CVE-2005-2655

More information:
The lockmail binary shipped with maildrop allows for an attacker to 
obtain an effective gid as group "mail". Debian ships the binary with its 
setgid bit set, but the program does not drop privileges when run. It takes 
an argument that is executed, and since it does not drop privileges, an 
attacker can execute an arbitrary command with an effective gid of the "mail" 
group. 

For the testing distribution (etch) this is fixed in version 1.5.3-1.1etch1
For the unstable distribution (sid) this is fixed in version 1.5.3-2

This upgrade is recommended if you use maildrop.

If you have the secure testing lines in your sources.list, you can update by running this command as root:
apt-get update && apt-get install maildrop


To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:

deb http://secure-testing.debian.net/debian-secure-testing etch/security-updates main contrib non-free
deb-src http://secure-testing.debian.net/debian-secure-testing etch/security-updates main contrib non-free

The archive signing key can be downloaded from
http://testing-security.debian.net/ziyi-2005-7.asc


Valid HTML 4.01! Valid CSS!