GLSA Bodhisattva
Joined: 13 Jun 2003 Posts: 4087 Location: Dresden, Germany
|
Posted: Mon Mar 21, 2005 1:25 am Post subject: [ GLSA 200503-26 ] Sylpheed, Sylpheed-claws: Message reply o |
|
|
Gentoo Linux Security Advisory
Title: Sylpheed, Sylpheed-claws: Message reply overflow (GLSA 200503-26)
Severity: normal
Exploitable: remote
Date: March 20, 2005
Bug(s): #84056
ID: 200503-26
Synopsis
Sylpheed and Sylpheed-claws contain a vulnerability that can be triggered when replying to specially crafted messages.
Background
Sylpheed is a lightweight email client and newsreader. Sylpheed-claws is a 'bleeding edge' version of Sylpheed.
Affected Packages
Package: mail-client/sylpheed
Vulnerable: < 1.0.3
Unaffected: >= 1.0.3
Architectures: All supported architectures
Package: mail-client/sylpheed-claws
Vulnerable: < 1.0.3
Unaffected: >= 1.0.3
Architectures: All supported architectures
Description
Sylpheed and Sylpheed-claws fail to properly handle non-ASCII characters in email headers when composing reply messages.
Impact
An attacker can send an email containing a malicious non-ASCII header which, when replied to, would cause the program to crash, potentially allowing the execution of arbitrary code with the privileges of the user running the software.
Workaround
There is no known workaround at this time.
Resolution
All Sylpheed users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/sylpheed-1.0.3" | All Sylpheed-claws users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/sylpheed-claws-1.0.3" |
References
Sylpheed ChangeLog
CAN-2005-0667
Last edited by GLSA on Sun May 07, 2006 4:55 pm; edited 1 time in total |
|