|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2003-0852: sylpheed: remote exploitable format string bug | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Thomas Biege <thomas> |
| Component: | Incidents | Assignee: | Jens Oberender <didge> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | CVE-2003-0852: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) | ||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | putonftp-8.2.sylpheed | ||
|
Description
Thomas Biege
2003-10-14 20:47:29 UTC
<!-- SBZ_reproduce --> quoted: How to reproduce: Create a test account with smtp server localhost:1234 Then do: perl -e 'print "535 failed %x%x%n\r\n"' | nc -l -p 1234 Then send a message. Actual result - sylpheed crashes. Created attachment 14900 [details]
putonftp-8.2.sylpheed
The Link of FullDisclosure was not related to Sylpheed. The only FullDisclosure mail with Sylpheed was: http://lists.insecure.org/lists/fulldisclosure/2003/May/0221.html But it stated: Sylpheed 0.8.11 (including -claws) is "vulnerable". Just a crash, don't worry about it. The diff is only valid for newer versions as there are only 7 occurences of alertpanel_error_log in the Sources if the 8.2 version. So the bug is for the current (9.0) version valid. Is there some documentation how to fix such bugs and release a YOU update? Yes, just 9.0 and STABLE are affected.
The following files/lines show the bug:
src/inc.c: alertpanel_error_log(err_msg);
src/send_message.c: alertpanel_error_log(err_msg);
Please change it to:
alertpanel_error_log("%s", err_msg);
Docu: Look at w3d.suse.de. mmj maintains a Pakaging-HowTo.
Just add the patch to you package, update the changes file (vc), cp the whole directory
plus the putonftp file to /work/src/done/9.0/ resp. to /work/src/done/STABLE/ , ask
suse-dist to build your package (you may want to use distmail for it).
I build the package on copied it in the locations. I added the putonftp only to the 9.0 one, with the option p as I don't think we x as the bug isn't severe in my eyes. Could someone please check and accept it. Please readd the x-flag, it's absolutely needed. OK, I put it again in /work/src/done/9.0/, now with the x-flag. package approved For the case that we mention it in sect 2 of some announcement: This is CVE name CAN-2003-0852. R. CVE-2003-0852: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) |