Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200710-29 ] Sylpheed, Claws Mail: User-assisted remote execution of arbitrary code
Date: Thu, 25 Oct 2007 22:23:04
Message-Id: 20071025220146.GA16831@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200710-29
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Sylpheed, Claws Mail: User-assisted remote execution of
9 arbitrary code
10 Date: October 25, 2007
11 Bugs: #190104
12 ID: 200710-29
13
14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
15
16 Synopsis
17 ========
18
19 A format string error has been discovered in Sylpheed and Claws Mail,
20 potentially leading to the remote execution of arbitrary code.
21
22 Background
23 ==========
24
25 Sylpheed and Claws Mail are two GTK based e-mail clients.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 mail-client/sylpheed < 2.4.5 >= 2.4.5
34 2 mail-client/claws-mail < 3.0.0 >= 3.0.0
35 -------------------------------------------------------------------
36 2 affected packages on all of their supported architectures.
37 -------------------------------------------------------------------
38
39 Description
40 ===========
41
42 Ulf Harnhammar from Secunia Research discovered a format string error
43 in the inc_put_error() function in file src/inc.c.
44
45 Impact
46 ======
47
48 A remote attacker could entice a user to connect to a malicious POP
49 server sending specially crafted replies, possibly resulting in the
50 execution of arbitrary code with the privileges of the user running the
51 application.
52
53 Workaround
54 ==========
55
56 There is no known workaround at this time.
57
58 Resolution
59 ==========
60
61 All Sylpheed users should upgrade to the latest version:
62
63 # emerge --sync
64 # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-2.4.5"
65
66 All Claws Mail users should upgrade to the latest version:
67
68 # emerge --sync
69 # emerge --ask --oneshot --verbose ">=mail-client/claws-mail-3.0.0"
70
71 References
72 ==========
73
74 [ 1 ] CVE-2007-2958
75 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2958
76
77 Availability
78 ============
79
80 This GLSA and any updates to it are available for viewing at
81 the Gentoo Security Website:
82
83 http://security.gentoo.org/glsa/glsa-200710-29.xml
84
85 Concerns?
86 =========
87
88 Security is a primary focus of Gentoo Linux and ensuring the
89 confidentiality and security of our users machines is of utmost
90 importance to us. Any security concerns should be addressed to
91 security@g.o or alternatively, you may file a bug at
92 http://bugs.gentoo.org.
93
94 License
95 =======
96
97 Copyright 2007 Gentoo Foundation, Inc; referenced text
98 belongs to its owner(s).
99
100 The contents of this document are licensed under the
101 Creative Commons - Attribution / Share Alike license.
102
103 http://creativecommons.org/licenses/by-sa/2.5