Lucene search

K
gentooGentoo FoundationGLSA-200511-13
HistoryNov 15, 2005 - 12:00 a.m.

Sylpheed, Sylpheed-Claws: Buffer overflow in LDIF importer

2005-11-1500:00:00
Gentoo Foundation
security.gentoo.org
6

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

52.9%

Background

Sylpheed is a lightweight email client and newsreader. Sylpheed-Claws is a ‘bleeding edge’ version of Sylpheed. They both support the import of address books in LDIF (Lightweight Directory Interchange Format).

Description

Colin Leroy reported buffer overflow vulnerabilities in Sylpheed and Sylpheed-Claws. The LDIF importer uses a fixed length buffer to store data of variable length. Two similar problems exist also in the Mutt and Pine addressbook importers of Sylpheed-Claws.

Impact

By convincing a user to import a specially-crafted LDIF file into the address book, a remote attacker could cause the program to crash, potentially allowing the execution of arbitrary code with the privileges of the user running the software.

Workaround

There is no known workaround at this time.

Resolution

All Sylpheed users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-2.0.4"

All Sylpheed-Claws users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-claws-1.0.5-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmail-client/sylpheed< 2.0.4UNKNOWN
Gentooanyallmail-client/sylpheed-claws< 1.0.5-r1UNKNOWN

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

52.9%