[CLA-2003:630] Conectiva Security Announcement - balsa

Type securityvulns
Reporter Securityvulns
Modified 2003-04-23T00:00:00




PACKAGE : balsa SUMMARY : Buffer overflow in IMAP code and in libesmtp DATE : 2003-04-22 18:01:00 ID : CLA-2003:630 RELEVANT RELEASES : 8

DESCRIPTION Balsa is a GNOME email client. It includes code from mutt, wich is a text-mode email client.

An update[1] for mutt with a fix for a buffer overflow vulnerability[2] (CAN-2003-0140) in the code that handles IMAP folders was released in March 14th, 2003.

Balsa 1.2 incorporates the same code from mutt and is vulnerable as well. An attacker who is able to control an IMAP server accessed by Balsa can exploit this vulnerability to remotely crash the client or execute arbitrary code with the privileges of the user running it. This update fixes this vulnerability.

This announcement also includes a fix for a buffer oveflow vulnerability found in libesmtp, a library used by Balsa to handle SMTP conversations. An attacker able to control an SMTP server can exploit this vulnerability by sending specially crafted responses to a client that uses libesmtp. These messages can crash the client or execute arbitrary code in its context.

The Common Vulnerabilities and Exposures (CVE) project has assigned the name CAN-2002-1090 to this issue[3].

SOLUTION All users of the packages balsa and libesmtp should upgrade.

Please note that it is necessary to restart the balsa program (if it is already running) after the upgrade in order to run the new installed version.

REFERENCES: 1.http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626 2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0140 3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1090 4.http://distro2.conectiva.com.br/bugzilla/show_bug.cgi?id=8282 5.http://distro2.conectiva.com.br/bugzilla/show_bug.cgi?id=8281

UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/8/RPMS/balsa-1.2.4-2U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/balsa-help-1.2.4-2U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/libesmtp-0.8.12-1U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/libesmtp-devel-0.8.12-1U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/libesmtp-devel-static-0.8.12-1U80_1cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/SRPMS/balsa-1.2.4-2U80_1cl.src.rpm ftp://atualizacoes.conectiva.com.br/8/SRPMS/libesmtp-0.8.12-1U80_1cl.src.rpm

ADDITIONAL INSTRUCTIONS The apt tool can be used to perform RPM packages upgrades:

  • run: apt-get update
  • after that, execute: apt-get upgrade

Detailed instructions reagarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en

All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en

All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en

Copyright (c) 2003 Conectiva Inc. http://www.conectiva.com

subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org

iD8DBQE+pa3S42jd0JmAcZARAqy/AKDvWxXVVxCBYa8eJwRLhuj0jKNEJwCfRw4b iCmcBCe05Y9eBsYPaX+o+SA= =9Z9X -----END PGP SIGNATURE-----