Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200807-12 ] BitchX: Multiple vulnerabilities
Date: Mon, 21 Jul 2008 22:04:12
Message-Id: 488508E1.1070709@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200807-12
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Normal
11 Title: BitchX: Multiple vulnerabilities
12 Date: July 21, 2008
13 Bugs: #190667
14 ID: 200807-12
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 Multiple vulnerabilities in BitchX may allow for the remote execution
22 of arbitrary code or symlink attacks.
23
24 Background
25 ==========
26
27 BitchX is an IRC client.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 net-irc/bitchx <= 1.1-r4 Vulnerable!
36 -------------------------------------------------------------------
37 NOTE: Certain packages are still vulnerable. Users should migrate
38 to another package if one is available or wait for the
39 existing packages to be marked stable by their
40 architecture maintainers.
41
42 Description
43 ===========
44
45 bannedit reported a boundary error when handling overly long IRC MODE
46 messages (CVE-2007-4584). Nico Golde reported an insecure creation of a
47 temporary file within the e_hostname() function (CVE-2007-5839).
48
49 Impact
50 ======
51
52 A remote attacker could entice a user to connect to a malicious IRC
53 server, resulting in the remote execution of arbitrary code with the
54 privileges of the user running the application. A local attacker could
55 perform symlink attacks to overwrite arbitrary files on the local
56 machine.
57
58 Workaround
59 ==========
60
61 There is no known workaround at this time.
62
63 Resolution
64 ==========
65
66 Since BitchX is no longer maintained, we recommend that users unmerge
67 the vulnerable package and switch to another IRC client:
68
69 # emerge --unmerge "net-irc/bitchx"
70
71 References
72 ==========
73
74 [ 1 ] CVE-2007-4584
75 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4584
76 [ 2 ] CVE-2007-5839
77 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5839
78
79 Availability
80 ============
81
82 This GLSA and any updates to it are available for viewing at
83 the Gentoo Security Website:
84
85 http://security.gentoo.org/glsa/glsa-200807-12.xml
86
87 Concerns?
88 =========
89
90 Security is a primary focus of Gentoo Linux and ensuring the
91 confidentiality and security of our users machines is of utmost
92 importance to us. Any security concerns should be addressed to
93 security@g.o or alternatively, you may file a bug at
94 http://bugs.gentoo.org.
95
96 License
97 =======
98
99 Copyright 2008 Gentoo Foundation, Inc; referenced text
100 belongs to its owner(s).
101
102 The contents of this document are licensed under the
103 Creative Commons - Attribution / Share Alike license.
104
105 http://creativecommons.org/licenses/by-sa/2.5
106 -----BEGIN PGP SIGNATURE-----
107 Version: GnuPG v2.0.7 (GNU/Linux)
108 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
109
110 iD8DBQFIhQjhuhJ+ozIKI5gRAs3HAJ9HbqXEu7c8VRBaKr993wCgSdxbdQCdH6JN
111 Tp6jUMMhpK71RfRox8EmpnA=
112 =Q4uI
113 -----END PGP SIGNATURE-----