Format string flaw was found in the way boinc-client, a Berkeley Open Infrastructure for Network Computing (BOINC) client for distributed computing, performed account information write / dump into corresponding XML file. An attacker could provide an account file (file containing account information) with specially-crafted value of the 'gui_urls' item that, when processed would lead to boinc-client executable crash or, potentially, arbitrary code execution with the privileges of the user running the boinc-client binary. References: [1] http://www.openwall.com/lists/oss-security/2013/04/28/3 Relevant upstream patch: [2] http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9
This issue affects the versions of the boinc-client package, as shipped with Fedora release of 17, 18, and Fedora EPEL-6. Please schedule an update.
Created boinc-client tracking bugs for this issue Affects: fedora-all [bug 957811]
Created boinc-client tracking bugs for this issue Affects: epel-6 [bug 957812]
boinc-client-7.2.33-2.git1994cc8.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
boinc-client-7.2.33-2.git1994cc8.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
boinc-client-7.2.33-3.git1994cc8.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
MITRE assigned CVE-2013-7386 to this issue.