Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:8119
HistoryMar 22, 2005 - 12:00 a.m.

[ GLSA 200503-26 ] Sylpheed, Sylpheed-claws: Message reply overflow

2005-03-2200:00:00
vulners.com
11

EPSS

0.055

Percentile

93.3%


Gentoo Linux Security Advisory GLSA 200503-26


                                        http://security.gentoo.org/

Severity: Normal
Title: Sylpheed, Sylpheed-claws: Message reply overflow
Date: March 20, 2005
Bugs: #84056
ID: 200503-26


Synopsis

Sylpheed and Sylpheed-claws contain a vulnerability that can be
triggered when replying to specially crafted messages.

Background

Sylpheed is a lightweight email client and newsreader. Sylpheed-claws
is a 'bleeding edge' version of Sylpheed.

Affected packages

-------------------------------------------------------------------
 Package                     /  Vulnerable  /           Unaffected
-------------------------------------------------------------------

1 mail-client/sylpheed < 1.0.3 >= 1.0.3
2 mail-client/sylpheed-claws < 1.0.3 >= 1.0.3
-------------------------------------------------------------------
2 affected packages on all of their supported architectures.
-------------------------------------------------------------------

Description

Sylpheed and Sylpheed-claws fail to properly handle non-ASCII
characters in email headers when composing reply messages.

Impact

An attacker can send an email containing a malicious non-ASCII header
which, when replied to, would cause the program to crash, potentially
allowing the execution of arbitrary code with the privileges of the
user running the software.

Workaround

There is no known workaround at this time.

Resolution

All Sylpheed users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-1.0.3&quot;

All Sylpheed-claws users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-claws-1.0.3&quot;

References

[ 1 ] Sylpheed ChangeLog
http://sylpheed.good-day.net/#changes
[ 2 ] CAN-2005-0667
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0667

Availability

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200503-26.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

EPSS

0.055

Percentile

93.3%