Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
For bugs related to Red Hat Enterprise Linux 2.1 product line. For Red Hat Enterprise Linux 6 and above, please visit Red Hat JIRA https://issues.redhat.com/secure/CreateIssue!default.jspa?pid=12332745 to report new issues.

Bug 108189

Summary: CAN-2003-0855 Pan crash on long email address
Product: Red Hat Enterprise Linux 2.1 Reporter: Mark J. Cox <mjc>
Component: panAssignee: Jens Petersen <petersen>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: low    
Version: 2.1Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2003-12-10 16:49:05 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mark J. Cox 2003-10-28 14:25:42 UTC
From bug 107519

If you try to view a group with a posting with a long sender address
pan core dumps.

Version-Release number of selected component (if applicable):
pan-0.13.3-3

How reproducible:
Happens every time.

Steps to Reproduce:
1. Post a message with a long address in From:
2. Try to view the group with pan
    
Actual results:
Pan dumps core

Expected results:
Pan views the group correctly possibly truncating the email address to a
reasonable length.

Additional info:
The bug is listed as security because it is possibly a buffer overflow
that
could potentially be used to execute arbitrary code in every pan
client viewing
the group.

The problem was first seen with a 702 character long email address in the
posting
<mlknecndwmlmnhrntstjauevkcntugtxzvxdvqueiivkcqurmwavvxs.dk>
in
the group dk.test on the server news.tele.dk.

This is a known issue with patch available:
http://bugzilla.gnome.org/show_bug.cgi?id=107025

To follow up on this, the crash causes a null byte to be written to
0x00 which causes a crash but isn't able to be exploited further
(therefore this is limited to a DoS).  Errata in progress.

Comment 1 Mark J. Cox 2003-10-28 14:26:23 UTC
RHSA-2003:312 in progress


Comment 2 Jens Petersen 2003-10-29 06:55:38 UTC
Errata packages submitting to QA.

Comment 3 Mark J. Cox 2003-12-10 16:49:05 UTC
An errata has been issued which should help the problem described in this bug report. 
This report is therefore being closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, please follow the link below. You may reopen 
this bug report if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2003-312.html