Sylpheed and Sylpheed-Claws POP3 Format String Vulnerability
BID:25430
Info
Sylpheed and Sylpheed-Claws POP3 Format String Vulnerability
| Bugtraq ID: | 25430 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-2958 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 24 2007 12:00AM |
| Updated: | Mar 13 2008 02:01AM |
| Credit: | Ulf Harnhammar of Secunia Research discovered this issue. |
| Vulnerable: |
Sylpheed Sylpheed-Claws (Claws Mail) 2.10 Sylpheed sylpheed-claws 1.9.100 Sylpheed Sylpheed 2.4.4 SuSE Linux 10.1 x86-64 SuSE Linux 10.1 x86 SuSE Linux 10.1 ppc SuSE Linux 10.0 x86-64 SuSE Linux 10.0 x86 SuSE Linux 10.0 ppc S.u.S.E. openSUSE 10.3 S.u.S.E. openSUSE 10.2 Redhat Fedora 7 Gentoo Linux |
| Not Vulnerable: | |
Discussion
Sylpheed and Sylpheed-Claws POP3 Format String Vulnerability
Sylpheed and Sylpheed-Claws are prone to a format-string vulnerability.
This issue presents itself because the applications fail to properly sanitize POP3 server error responses that contain format specifiers.
A successful attack may crash the application or possibly lead to arbitrary code execution. This may facilitate unauthorized access or privilege escalation in the context of the user running the application.
Sylpheed 2.4.4, Sylpheed-Claws 1.9.100, and Sylpheed-Claws 'Claws Mail' 2.10.0 are vulnerable to this issue; other versions may also be affected.
Sylpheed and Sylpheed-Claws are prone to a format-string vulnerability.
This issue presents itself because the applications fail to properly sanitize POP3 server error responses that contain format specifiers.
A successful attack may crash the application or possibly lead to arbitrary code execution. This may facilitate unauthorized access or privilege escalation in the context of the user running the application.
Sylpheed 2.4.4, Sylpheed-Claws 1.9.100, and Sylpheed-Claws 'Claws Mail' 2.10.0 are vulnerable to this issue; other versions may also be affected.
Exploit / POC
Sylpheed and Sylpheed-Claws POP3 Format String Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Sylpheed and Sylpheed-Claws POP3 Format String Vulnerability
Solution:
The Sylpheed and Sylpheed-Claws teams have addressed this vulnerability in the SVN and CVS repositories for Sylpheed and Claws Mail. Please see the vendor references for details.
Solution:
The Sylpheed and Sylpheed-Claws teams have addressed this vulnerability in the SVN and CVS repositories for Sylpheed and Claws Mail. Please see the vendor references for details.
References
Sylpheed and Sylpheed-Claws POP3 Format String Vulnerability
References:
References:
- Claws Mail Homepage (Claws Mail)
- Sylpheed Homepage (Sylpheed)
- Sylpheed / Sylpheed-Claws POP3 Format String Vulnerability (Secunia Research)