Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 190861 - gnome-extra/evolution-data-server-1.10* - Security bug in Camel's IMAP provider (CVE-2007-3257)
Summary: gnome-extra/evolution-data-server-1.10* - Security bug in Camel's IMAP provid...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://bugzilla.gnome.org/show_bug.cg...
Whiteboard: B2 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2007-08-31 10:26 UTC by Mart Raudsepp
Modified: 2008-01-10 08:38 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Mart Raudsepp gentoo-dev 2007-08-31 10:26:32 UTC
This was already fixed in 1.10.1-r3, but it got accidentally lost in 1.10.2, which has now been stable for about a month now. Upstream includes this fix in 1.10.3.1, which I will commit to the tree soon. I advise speedy stabilization of it once in the tree.


+++ This bug was initially created as a clone of Bug #182011 +++

Original bug report: http://bugzilla.gnome.org/show_bug.cgi?id=447414

Just copying description from the upstream bug report:

==================================================
The "SEQUENCE" value in the GData of the IMAP code (camel-imap-folder.c) is
converted from a string using strtol. This allows for negative values.

The imap_rescan uses this value as an int. It checks for !seq and
seq>summary.length. It doesn't check for seq < 0. Although seq is used as the
index of an array.

This means that a negative index number can be fed to the array lookup by
altering the output of an IMAP server.

I'm marking this as a blocker (very very serious) security bug as this is
remotely exploitable (I can put shell code in the UID field of the IMAP code,
and make it execute on the victim's computer, as at the seq'd field of the
index a g_strdup of the UID is written to memory. By carefully calculating the
negative value and overwriting the instruction pointer near the array's start,
I can let it point to that memory and get it to execute).

I first informed the Camel authors about this bug, but they didn't respond
quickly enough (it has been months now). I hereby stop caring about the secrecy
of security bug reports and I do report it now.

This bug affects nearly all versions of Evolutions. It can be fixed by either
checking for seq < 0 or by using strtoul in stead of strtol.
==================================================

Both evolution-data-server-1.8.3-r4 and evolution-data-server-1.10.1-r2 are affected. 1.6.x affected but should be removed from the tree at some point... As soon as patches will be applied upstream, I'll do the same in our ebuilds.
Comment 1 Mart Raudsepp gentoo-dev 2007-08-31 10:50:28 UTC
gnome-extra/evolution-data-server-1.10.3.1 is in the tree now, which includes the imap overflow fix in the upstream tarball already.
It also includes patches from bugs #133504 and #175516 and the usual bug fixes, leak fixes and so on included between 1.10.2 and 1.10.3.1 releases.

Target arches are alpha, amd64, arm, hppa, ia64, ppc, sparc, x86.
ppc64 currently has no stable 1.10.x yet and is not affected in the stable tree, will add a note to the GNOME-2.18 stabilization bug to go for evolution-data-server-1.10.3.1 instead, if you agree with this for the rest of the arches.
Security team, please feel free to CC the arches if you agree on the quick stabilization for this security issue.
Comment 2 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-08-31 12:38:44 UTC
(In reply to comment #1)
> Target arches are alpha, amd64, arm, hppa, ia64, ppc, sparc, x86.
> ppc64 currently has no stable 1.10.x yet and is not affected in the stable
> tree, will add a note to the GNOME-2.18 stabilization bug to go for
> evolution-data-server-1.10.3.1 instead, if you agree with this for the rest of
> the arches.
> Security team, please feel free to CC the arches if you agree on the quick
> stabilization for this security issue.

Well, we don't have much choices here :)
arches, please test and mark stable gnome-extra/evolution-data-server-1.10.3.1.
Comment 3 Ferris McCormick (RETIRED) gentoo-dev 2007-08-31 13:15:30 UTC
Sparc stable.
Comment 4 Jeroen Roovers (RETIRED) gentoo-dev 2007-08-31 15:54:32 UTC
Stable for HPPA.
Comment 5 Chris Gianelloni (RETIRED) gentoo-dev 2007-08-31 17:45:55 UTC
amd64/x86 done...
Comment 6 Tobias Scherbaum (RETIRED) gentoo-dev 2007-09-01 08:05:36 UTC
ppc stable
Comment 7 Raúl Porcel (RETIRED) gentoo-dev 2007-09-01 10:25:14 UTC
alpha/ia64 stable
Comment 8 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-09-17 21:13:11 UTC
glsa request filed.
Comment 9 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-11-06 22:02:12 UTC
GLSA 200711-04, sorry for the delay.