[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Processed: The so-called "remote exploit in pine"



Processing commands for control@bugs.debian.org:

> severity 33099 normal
Bug#33099: PINE allows remote users to execute commands as the user running PINE, by sending an email
Severity set to `normal'.

> severity 33210 normal
Bug#33210: So-called "remote exploit in pine" (fwd)
Severity set to `normal'.

> reassign 33099 general
Bug#33099: PINE allows remote users to execute commands as the user running PINE, by sending an email
Bug reassigned from package `pine396-src' to `general'.

> reassign 33210 general
Bug#33210: So-called "remote exploit in pine" (fwd)
Bug reassigned from package `mime-support' to `general'.

> merge 33099 33210
Bug#33099: PINE allows remote users to execute commands as the user running PINE, by sending an email
Bug#33210: So-called "remote exploit in pine" (fwd)
Merged 33099 33210.

> I have been unable to reproduce the problem reported in Bug#33099.
Unknown command or malformed arguments to command.

> If I'm not mistaken, to deal with this we would have to check that all our
Unknown command or malformed arguments to command.

> printcap entries are safe (hence the "general" reassignement).
Unknown command or malformed arguments to command.

> I will let the Debian security experts to decide about the severity of
Unknown command or malformed arguments to command.

> these bugs (previously 33099 was "critical" and 33210 "normal").
Unknown command or malformed arguments to command.

Too many unknown commands, stopping here.

Please contact me if you need assistance.

Ian Jackson
(administrator, Debian bugs database)


Reply to: