Bug 260581 - (CVE-2007-4560) CVE-2007-4560 ClamAV missing escaping of popen() arguments
CVE-2007-4560 ClamAV missing escaping of popen() arguments
Status: CLOSED CURRENTRELEASE
Product: Fedora
Classification: Fedora
Component: clamav (Show other bugs)
rawhide
All All
medium Severity low
: ---
: ---
Assigned To: Enrico Scholz
Fedora Extras Quality Assurance
http://cve.mitre.org/cgi-bin/cvename....
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2007-08-28 11:44 EDT by Lubomir Kundrak
Modified: 2007-11-30 17:12 EST (History)
1 user (show)

See Also:
Fixed In Version: 0.91.2-1
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-09-25 13:35:44 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Lubomir Kundrak 2007-08-28 11:44:48 EDT
======================================================
Name: CVE-2007-4560
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4560
Final-Decision:
Interim-Decision:
Modified:
Proposed:
Assigned: 20070827
Category:
Reference: BUGTRAQ:20070824 n.runs-SA-2007.025 - ClamAV Remote Code Execution
Advisory
Reference:
URL:http://www.securityfocus.com/archive/1/archive/1/477723/100/0/threaded
Reference:
MISC:http://www.nruns.com/security_advisory_clamav_remote_code_exection.php
Reference: BID:25439
Reference: URL:http://www.securityfocus.com/bid/25439

clamav-milter in ClamAV before 0.91.2, when run in black hole mode,
allows remote attackers to execute arbitrary commands via shell
metacharacters that are used in a certain popen call, involving the
"recipient field of sendmail."
Comment 1 Lubomir Kundrak 2007-09-25 05:43:33 EDT
Ping on this issue. Was this solved in
https://admin.fedoraproject.org/updates/F7/clamav-0.91.2-2.fc7 this update?

The changelog says:
* Sat Aug 25 2007 Enrico Scholz <enrico.scholz@informatik.tu-chemnitz.de> - 0.91.2-2
- fixed an open(2) issue
Comment 2 Enrico Scholz 2007-09-25 13:35:44 EDT
no, by

* Sat Aug 25 2007 Enrico Scholz <enrico.scholz@informatik.tu-chemnitz.de> - 0.91.2-1
- arbitrary command execution by special crafted recipients in
  clamav-milter's black-hole mode

Note You need to log in before you can comment on or make changes to this bug.