Gentoo Archives: gentoo-announce

From: Luke Macken <lewk@g.o>
To: gentoo-announce@××××××××××××.org
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200503-26 ] Sylpheed, Sylpheed-claws: Message reply overflow
Date: Sun, 20 Mar 2005 23:51:40
Message-Id: 20050320235114.GA7608@tomservo.hsd1.ma.comcast.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200503-26
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Sylpheed, Sylpheed-claws: Message reply overflow
9 Date: March 20, 2005
10 Bugs: #84056
11 ID: 200503-26
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Sylpheed and Sylpheed-claws contain a vulnerability that can be
19 triggered when replying to specially crafted messages.
20
21 Background
22 ==========
23
24 Sylpheed is a lightweight email client and newsreader. Sylpheed-claws
25 is a 'bleeding edge' version of Sylpheed.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 mail-client/sylpheed < 1.0.3 >= 1.0.3
34 2 mail-client/sylpheed-claws < 1.0.3 >= 1.0.3
35 -------------------------------------------------------------------
36 2 affected packages on all of their supported architectures.
37 -------------------------------------------------------------------
38
39 Description
40 ===========
41
42 Sylpheed and Sylpheed-claws fail to properly handle non-ASCII
43 characters in email headers when composing reply messages.
44
45 Impact
46 ======
47
48 An attacker can send an email containing a malicious non-ASCII header
49 which, when replied to, would cause the program to crash, potentially
50 allowing the execution of arbitrary code with the privileges of the
51 user running the software.
52
53 Workaround
54 ==========
55
56 There is no known workaround at this time.
57
58 Resolution
59 ==========
60
61 All Sylpheed users should upgrade to the latest version:
62
63 # emerge --sync
64 # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-1.0.3"
65
66 All Sylpheed-claws users should upgrade to the latest version:
67
68 # emerge --sync
69 # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-claws-1.0.3"
70
71 References
72 ==========
73
74 [ 1 ] Sylpheed ChangeLog
75 http://sylpheed.good-day.net/#changes
76 [ 2 ] CAN-2005-0667
77 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0667
78
79 Availability
80 ============
81
82 This GLSA and any updates to it are available for viewing at
83 the Gentoo Security Website:
84
85 http://security.gentoo.org/glsa/glsa-200503-26.xml
86
87 Concerns?
88 =========
89
90 Security is a primary focus of Gentoo Linux and ensuring the
91 confidentiality and security of our users machines is of utmost
92 importance to us. Any security concerns should be addressed to
93 security@g.o or alternatively, you may file a bug at
94 http://bugs.gentoo.org.
95
96 License
97 =======
98
99 Copyright 2005 Gentoo Foundation, Inc; referenced text
100 belongs to its owner(s).
101
102 The contents of this document are licensed under the
103 Creative Commons - Attribution / Share Alike license.
104
105 http://creativecommons.org/licenses/by-sa/2.0