|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-0100: emacs: format string bugs in helper application | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | heiko.rommel, patch-request, security-team, thomas, werner |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | CVE-2005-0100: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Thomas Biege
2005-01-27 20:37:16 UTC
<!-- SBZ_reproduce --> - Do we ever (since 8.1) shipped movemail set[ug]id? Even if not we have to fix it b/c it's remotely exploitable. CAN-2005-0100: SM-Tracker-254 Info about CRD: From: Martin Schulze <joey@infodrom.org> To: Free Software Distribution Vendors <vendor-sec@lst.de> User-Agent: Mutt/1.5.6+20040907i Subject: [vendor-sec] DATE MOVED (was: CAN-2005-0100: Arbitrary code execution in *emacs*) Errors-To: vendor-sec-admin@lst.de Date: Mon, 31 Jan 2005 08:02:08 +0100 Martin Schulze wrote: > Max Vozeler discovered several format string vulnerabilities in the > movemail utility of Emacs, the well-known editor. Via connecting to a > malicious POP server an attacker can execute arbitrary code under the > privileges of group mail (or worse, depending on the permissions of > the movemail binary). > > I propose to disclose this on February 10th as well. This timeline was moved a bit to February 6th. On the same day XEmacs21 21.4.17 will be released. Regards, Joey -- > I propose to disclose this on February 10th as well.
The date has been moved to February 6th and XEmacs21 21.4.17 will
be released including the correction on the same day.
Regards,
Joey
Args ... I'm currently not able to fork. Please update your kernel. ;) emacs is fixed and submitted to STABLE, 8.1, 8,2, 9.0, 9.1, and 9.2 I've also provided the patchinfos for the box and the SLES, feel free to change them. xemacs is fixed and submitted to STABLE, 8.1, 8,2, 9.0, 9.1, and 9.2 I've also provided the patchinfos for the box and the SLES, feel free to change them. FIXED <!-- SBZ_reopen -->Reopened by meissner@suse.de at Fri Feb 4 17:33:32 2005, took initial reporter thomas@suse.de to cc reopen for tracking make public, and for QA to look at too. updates approved. CVE-2005-0100: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) |