A security flaw was found in the way WeeChat (Wee Enhanced Environment for Chat), a portable, fast, light and extensible IRC client, performed command execution in hook_process, when a plug-in or script provided an untrusted input to WeeChat hook. A remote attacker could use this flaw to cause arbitrary code execution with the privileges of the user running the WeeChat client plug-in. Upstream bug report: [1] https://savannah.nongnu.org/bugs/?37764 Relevant patch: [2] http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff_plain;h=efb795c74fe954b9544074aafcebb1be4452b03a CVE request: [3] http://www.openwall.com/lists/oss-security/2012/11/19/2 References: [4] http://www.weechat.org/security/ [5] http://www.weechat.org/files/changelog/ChangeLog-0.3.9.2.html
This issue affects the versions of the weechat package, as shipped with Fedora release of 16 and 17. Please schedule an update. -- This issue affects the version of the weechat package, as shipped with Fedora EPEL 6. Please schedule an update. -- This issue did NOT affect the version of the weechat package, as shipped with Fedora EPEL 5 as it did not include the vulnerable source code part / functionality (yet).
Created weechat tracking bugs for this issue Affects: fedora-all [bug 878026] Affects: epel-6 [bug 878027]
The CVE identifier of CVE-2012-5534 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2012/11/19/4
weechat-0.3.8-4.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
Updates for all products, this issue had affected previously, has been submitted already. Closing this bug.
weechat-0.3.8-4.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
weechat-0.3.8-4.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.