Bug 254121 (CVE-2007-2958) - CVE-2007-2958 claws-mail format string vulnerability
Summary: CVE-2007-2958 claws-mail format string vulnerability
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2007-2958
Product: Fedora
Classification: Fedora
Component: claws-mail
Version: 7
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Andreas Bierfert
QA Contact: Fedora Extras Quality Assurance
URL: http://secunia.com/advisories/26550/
Whiteboard: impact=important,source=vendorsec,rep...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-08-24 10:05 UTC by Tomas Hoger
Modified: 2007-11-30 22:12 UTC (History)
0 users

Fixed In Version: 3.0.0-1.fc7
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-09-04 22:13:20 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Tomas Hoger 2007-08-24 10:05:34 UTC
Ulf Harnhammar (Secunia Research) has discovered a format string vulnerability
in sylpheed and claws-mail in inc_put_error() function in src/inc.c when
displaying POP3 error reply.

Problem can be exploited by malicious POP3 server via specially crafted POP3
server replies containing format specifiers.

Successful exploitation may allow execution of arbitrary code, but requires that
the user is tricked into connecting to a malicious POP3 server.

Secunia advisory:

http://secunia.com/advisories/26550/

Upstream patch:

http://cvs.sunsite.dk/viewcvs.cgi/sylpheedclaws/sylpheed-claws/src/inc.c.diff?r1=1.149.2.79&r2=1.149.2.80&only_with_tag=gtk2

New upstream version should be release in a few days.

Comment 1 Fedora Update System 2007-09-04 22:13:19 UTC
claws-mail-3.0.0-1.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.