COMMAND

    listmanager

SYSTEMS AFFECTED

    listmanager

PROBLEM

    Following  is  based  on  a  FreeBSD-SA-00:50  Security  Advisory.
    The listmanager port, versions prior to 2.105.1, contained several
    locally exploitable buffer overflow vulnerabilities which could be
    used to gain root privileges.

    Since  the  source  code  to  listmanager  is not available, it is
    difficult  to  determine  whether  there  are  remaining  security
    vulnerabilities,   or   whether   the   software   was  previously
    exploitable remotely, but  we believe the  author has made  a good
    faith effort to improve the security of the code.

    Unprivileged users can obtain root privileges on the local system.
    If you have  not chosen to  install the listmanager  port/package,
    then your system is not vulnerable to this problem.

SOLUTION

    Deinstall the listmanager port/package, if you have installed it.

    Solutio is one of the following:

        1) Upgrade  your  entire  ports  collection  and  rebuild  the
           listmanager port.
        2) Deinstall the old package  and install a new package  dated
           after the correction date, obtained from:
           ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/mail/listmanager-2.105.1.tgz
           ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/mail/listmanager-2.105.1.tgz
           ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/mail/listmanager-2.105.1.tgz
           ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/mail/listmanager-2.105.1.tgz
           ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/mail/listmanager-2.105.1.tgz
        3) download a new port skeleton for the listmanager port from:
           http://www.freebsd.org/ports/
           and use it to rebuild the port.