Bug 459487 (CVE-2008-3533)

Summary: CVE-2008-3533 yelp: Invalid URI format string vulnerability (remote arbitrary code execution)
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: mbarnes
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-10-01 18:07:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 459502    
Bug Blocks:    

Description Jan Lieskovsky 2008-08-19 11:32:40 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-3533 to
the following vulnerability:

Format string vulnerability in the window_error function in
yelp-window.c in yelp in Gnome after 2.19.90 and before 2.24 allows
remote attackers to execute arbitrary code via format string
specifiers in an invalid URI on the command line, as demonstrated by
use of yelp within (1) man or (2) ghelp URI handlers in Firefox,
Evolution, and unspecified other programs.

References:

http://bugzilla.gnome.org/attachment.cgi?id=115890
http://bugzilla.gnome.org/show_bug.cgi?id=546364
https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860
http://www.securityfocus.com/bid/30690
http://secunia.com/advisories/31465
http://xforce.iss.net/xforce/xfdb/44449

Proposed patch:

http://bugzilla.gnome.org/attachment.cgi?id=115890

Comment 1 Jan Lieskovsky 2008-08-19 11:42:01 UTC
CVE-2008-3533 This issue does not affect the versions of the yelp package,
as shipped with Red Hat Enterprise Linux 3, 4 and 5. 

CVE-2008-3533: This issue affects the versions of the yelp package, as
shipped with Fedora8, Fedora9 and Fedora10.

Comment 2 Tomas Hoger 2008-08-19 14:29:07 UTC
For the sake of completeness, among current Fedora versions, this issue only matters to Fedora 8.  On Fedora 9, attempt to exploit this format string flaw is detected by glibc and will only result in controlled application shutdown.

So we should consider having the fix included in F8's yelp soon, for F9+ this only needs to be treated as "crasher" bug triggered by some odd inputs.

Comment 4 Fedora Update System 2008-08-25 19:34:14 UTC
yelp-2.20.0-12.fc8 has been submitted as an update for Fedora 8.
http://admin.fedoraproject.org/updates/yelp-2.20.0-12.fc8

Comment 5 Fedora Update System 2008-09-10 06:50:24 UTC
yelp-2.20.0-12.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 6 Red Hat Product Security 2008-10-01 18:07:50 UTC
This issue was addressed in:

Fedora:
  https://admin.fedoraproject.org/updates/F8/FEDORA-2008-7293