From:	 dburcaw@newhope.terraplex.com
To:	 yellowdog-updates@lists.yellowdoglinux.com
Subject: [yellowdog-updates] Yellow Dog Linux Security Update: YDU-20020127-8
Date:	 28 Jan 2002 01:43:07 -0000

Yellow Dog Linux Security Announcement
--------------------------------------

Package:	pine	
Issue Date: 	January 27, 2002	
Priority:	high		
Advisory ID: 	YDU-20020127-8


1. 	Topic:

	Pine (version 4.43 and earlier) as released with all currently
	supported versions of Red Hat Linux (6.2, 7, 7.1, 7.2), contains a URL
	handling bug. This bug can allow a malicious attacker to cause arbitrary
	commands embedded in a URL to be executed on the users system upon
	attempting to view the URL.


2. 	Problem:

	The purpose of this release is to fix a security bug with the
	treatment of quotes in the URL-handling code. The bug allows a
	malicious sender to embed commands in a URL. This bug is present
	in all versions of UNIX Pine 4.43 or earlier.

	Example: A URL constructed as:

	http://www.somewhere.com/'&touch${IFS}/tmp/foo${IFS}/tmp/bar'

	would cause the files /tmp/foo and /tmp/bar to be created on the
	user's machine if the URL is viewed.

	Thanks to zen-parse for discovering and reporting this problem.
	The Common Vulnerabilities and Exposures project (cve.mitre.org) has
	assigned the name CAN-2002-0014 to this issue.

	All users of Pine are urged to upgrade to this erratum release.
	(from Red Hat advisory)


3. 	Solution:

   	a) Updating via yup...
   	We suggest that you use the Yellow Dog Update Program (yup)
   	to keep your system up-to-date. The following command(s) will
   	automatically retrieve and install the fixed version of
   	this update onto your system:

   		yup update pine 

   	b) Updating manually...
   	The update can also be retrieved manually from our ftp site
   	below along with the rpm command that should be used to install
   	the update.  (Please use a mirror site)

   		ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.1/ppc/
		rpm -Fvh pine-4.44-1.70.0a.ppc.rpm


4. Verification

MD5 checksum			  Package
--------------------------------  ----------------------------
f5016f4e31573d8abbac9d30228feb88  ppc/pine-4.44-1.70.0a.ppc.rpm
bda2f330cb99c85e6796d6fe965066e2  SRPMS/pine-4.44-1.70.0a.src.rpm

If you wish to verify that each package has not been corrupted or tampered with,
examine the md5sum with the following command: rpm --checksig --nogpg filename


5. Misc.

Terra Soft has setup a moderated mailing list where these security, bugfix, and package
enhancement announcements will be posted. See http://lists.yellowdoglinux.com/ for more
information.

For information regarding the usage of yup, the Yellow Dog Update Program, see 
http://http://www.yellowdoglinux.com/support/solutions/ydl_general/yup.shtml