GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Nov 15, 2005 2:13 pm Post subject: [ GLSA 200511-13 ] Sylpheed, Sylpheed-Claws: Buffer overflow |
|
|
Gentoo Linux Security Advisory
Title: Sylpheed, Sylpheed-Claws: Buffer overflow in LDIF importer (GLSA 200511-13)
Severity: normal
Exploitable: remote
Date: November 15, 2005
Bug(s): #111853
ID: 200511-13
Synopsis
Sylpheed and Sylpheed-Claws contain a buffer overflow vulnerability which may lead to the execution of arbitrary code.
Background
Sylpheed is a lightweight email client and newsreader. Sylpheed-Claws is a 'bleeding edge' version of Sylpheed. They both support the import of address books in LDIF (Lightweight Directory Interchange Format).
Affected Packages
Package: mail-client/sylpheed
Vulnerable: < 2.0.4
Unaffected: >= 2.0.4
Architectures: All supported architectures
Package: mail-client/sylpheed-claws
Vulnerable: < 1.0.5-r1
Unaffected: >= 1.0.5-r1
Architectures: All supported architectures
Description
Colin Leroy reported buffer overflow vulnerabilities in Sylpheed and Sylpheed-Claws. The LDIF importer uses a fixed length buffer to store data of variable length. Two similar problems exist also in the Mutt and Pine addressbook importers of Sylpheed-Claws.
Impact
By convincing a user to import a specially-crafted LDIF file into the address book, a remote attacker could cause the program to crash, potentially allowing the execution of arbitrary code with the privileges of the user running the software.
Workaround
There is no known workaround at this time.
Resolution
All Sylpheed users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/sylpheed-2.0.4" | All Sylpheed-Claws users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/sylpheed-claws-1.0.5-r1" |
References
CVE-2005-3354
Last edited by GLSA on Sun May 07, 2006 4:59 pm; edited 1 time in total |
|