Bug 459487 (CVE-2008-3533) - CVE-2008-3533 yelp: Invalid URI format string vulnerability (remote arbitrary code execution)
Summary: CVE-2008-3533 yelp: Invalid URI format string vulnerability (remote arbitrary...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-3533
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 459502
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-08-19 11:32 UTC by Jan Lieskovsky
Modified: 2021-11-12 19:51 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-10-01 18:07:50 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2008-08-19 11:32:40 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-3533 to
the following vulnerability:

Format string vulnerability in the window_error function in
yelp-window.c in yelp in Gnome after 2.19.90 and before 2.24 allows
remote attackers to execute arbitrary code via format string
specifiers in an invalid URI on the command line, as demonstrated by
use of yelp within (1) man or (2) ghelp URI handlers in Firefox,
Evolution, and unspecified other programs.

References:

http://bugzilla.gnome.org/attachment.cgi?id=115890
http://bugzilla.gnome.org/show_bug.cgi?id=546364
https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860
http://www.securityfocus.com/bid/30690
http://secunia.com/advisories/31465
http://xforce.iss.net/xforce/xfdb/44449

Proposed patch:

http://bugzilla.gnome.org/attachment.cgi?id=115890

Comment 1 Jan Lieskovsky 2008-08-19 11:42:01 UTC
CVE-2008-3533 This issue does not affect the versions of the yelp package,
as shipped with Red Hat Enterprise Linux 3, 4 and 5. 

CVE-2008-3533: This issue affects the versions of the yelp package, as
shipped with Fedora8, Fedora9 and Fedora10.

Comment 2 Tomas Hoger 2008-08-19 14:29:07 UTC
For the sake of completeness, among current Fedora versions, this issue only matters to Fedora 8.  On Fedora 9, attempt to exploit this format string flaw is detected by glibc and will only result in controlled application shutdown.

So we should consider having the fix included in F8's yelp soon, for F9+ this only needs to be treated as "crasher" bug triggered by some odd inputs.

Comment 4 Fedora Update System 2008-08-25 19:34:14 UTC
yelp-2.20.0-12.fc8 has been submitted as an update for Fedora 8.
http://admin.fedoraproject.org/updates/yelp-2.20.0-12.fc8

Comment 5 Fedora Update System 2008-09-10 06:50:24 UTC
yelp-2.20.0-12.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 6 Red Hat Product Security 2008-10-01 18:07:50 UTC
This issue was addressed in:

Fedora:
  https://admin.fedoraproject.org/updates/F8/FEDORA-2008-7293


Note You need to log in before you can comment on or make changes to this bug.