Bugzilla – Bug 47310
VUL-0: CVE-2003-0852: sylpheed: remote exploitable format string bug
Last modified: 2021-09-29 14:38:37 UTC
Hi, a remote exploitable bug was found in sylpheed. http://lists.insecure.org/lists/fulldisclosure/2003/May/0070.html Ptach: http://cvs.sourceforge.net/viewcvs.py/sylpheed-claws/sylpheed-claws/src/send_message.c?r1=1.18&r2=1.19 Beside the format string bug there maybe an exploitable buffer overflow too. But till now it isnt public and we dont have a positiv confirmation.
<!-- SBZ_reproduce --> quoted: How to reproduce: Create a test account with smtp server localhost:1234 Then do: perl -e 'print "535 failed %x%x%n\r\n"' | nc -l -p 1234 Then send a message. Actual result - sylpheed crashes.
Created attachment 14900 [details] putonftp-8.2.sylpheed
The Link of FullDisclosure was not related to Sylpheed. The only FullDisclosure mail with Sylpheed was: http://lists.insecure.org/lists/fulldisclosure/2003/May/0221.html But it stated: Sylpheed 0.8.11 (including -claws) is "vulnerable". Just a crash, don't worry about it. The diff is only valid for newer versions as there are only 7 occurences of alertpanel_error_log in the Sources if the 8.2 version. So the bug is for the current (9.0) version valid. Is there some documentation how to fix such bugs and release a YOU update?
Yes, just 9.0 and STABLE are affected. The following files/lines show the bug: src/inc.c: alertpanel_error_log(err_msg); src/send_message.c: alertpanel_error_log(err_msg); Please change it to: alertpanel_error_log("%s", err_msg); Docu: Look at w3d.suse.de. mmj maintains a Pakaging-HowTo. Just add the patch to you package, update the changes file (vc), cp the whole directory plus the putonftp file to /work/src/done/9.0/ resp. to /work/src/done/STABLE/ , ask suse-dist to build your package (you may want to use distmail for it).
I build the package on copied it in the locations. I added the putonftp only to the 9.0 one, with the option p as I don't think we x as the bug isn't severe in my eyes. Could someone please check and accept it.
Please readd the x-flag, it's absolutely needed.
OK, I put it again in /work/src/done/9.0/, now with the x-flag.
package approved
For the case that we mention it in sect 2 of some announcement: This is CVE name CAN-2003-0852. R.
CVE-2003-0852: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)