Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 442600 (CVE-2012-5534) - <net-irc/weechat-0.3.9.2 : multiple vulnerabilities (CVE-2012-{5534,5854})
Summary: <net-irc/weechat-0.3.9.2 : multiple vulnerabilities (CVE-2012-{5534,5854})
Status: RESOLVED FIXED
Alias: CVE-2012-5534
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B2 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2012-11-10 13:43 UTC by Agostino Sarubbo
Modified: 2014-05-03 14:19 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2012-11-10 13:43:33 UTC
From https://bugzilla.redhat.com/show_bug.cgi?id=875181 :

A buffer overflow can be exploited using IRC colors.

The bug is fixed upstream: 
http://git.savannah.gnu.org/cgit/weechat.git/patch/?id=9453e81baa7935db82a0b765a47cba772aba730d
Comment 1 Daniel Kuehn (RETIRED) gentoo-dev 2012-11-10 15:43:02 UTC
I have now bumped the weechat ebuild to version 0.3.9.1 that is supposed to include the fix for this vulnerability.
Comment 2 Sean Amoss (RETIRED) gentoo-dev Security 2012-11-10 18:12:20 UTC
(In reply to comment #1)
> I have now bumped the weechat ebuild to version 0.3.9.1 that is supposed to
> include the fix for this vulnerability.

Thanks, Daniel. May we proceed with stabilization?
Comment 3 Daniel Kuehn (RETIRED) gentoo-dev 2012-11-10 20:54:06 UTC
(In reply to comment #2)
> (In reply to comment #1)
> > I have now bumped the weechat ebuild to version 0.3.9.1 that is supposed to
> > include the fix for this vulnerability.
> 
> Thanks, Daniel. May we proceed with stabilization?

Yes, I'm going to look some more into this and test it so we can proceed with stabilization.
Comment 4 Sean Amoss (RETIRED) gentoo-dev Security 2012-11-12 22:54:39 UTC
CVE assignment:

http://www.openwall.com/lists/oss-security/2012/11/12/2
Comment 5 Agostino Sarubbo gentoo-dev 2012-11-19 17:26:00 UTC
https://savannah.nongnu.org/bugs/?37764

please bump 0.3.9.2
Comment 6 Tomáš Chvátal (RETIRED) gentoo-dev 2012-11-19 17:34:39 UTC
Bumped.
Comment 7 Agostino Sarubbo gentoo-dev 2012-11-19 17:57:00 UTC
Arches, please test and mark stable:
=net-irc/weechat-0.3.9.2
Target keywords : "amd64 ppc x86"
Comment 8 GLSAMaker/CVETool Bot gentoo-dev 2012-11-20 00:47:49 UTC
CVE-2012-5854 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5854):
  Heap-based buffer overflow in WeeChat 0.3.6 through 0.3.9 allows remote
  attackers to cause a denial of service (crash or hang) and possibly execute
  arbitrary code via crafted IRC colors that are not properly decoded.
Comment 9 Agostino Sarubbo gentoo-dev 2012-11-20 13:39:39 UTC
amd64 stable
Comment 10 Anthony Basile gentoo-dev 2012-11-20 16:29:23 UTC
stable ppc
Comment 11 Agostino Sarubbo gentoo-dev 2012-11-21 10:16:53 UTC
x86 stable
Comment 12 Sean Amoss (RETIRED) gentoo-dev Security 2012-11-21 21:11:55 UTC
GLSA draft ready for review.
Comment 13 GLSAMaker/CVETool Bot gentoo-dev 2012-12-04 22:17:03 UTC
CVE-2012-5534 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5534):
  The hook_process function in the plugin API for WeeChat 0.3.0 through
  0.3.9.1 allows remote attackers to execute arbitrary commands via shell
  metacharacters in a command from a plugin, related to "shell expansion."
Comment 14 GLSAMaker/CVETool Bot gentoo-dev 2014-05-03 14:19:38 UTC
This issue was resolved and addressed in
 GLSA 201405-03 at http://security.gentoo.org/glsa/glsa-201405-03.xml
by GLSA coordinator Sean Amoss (ackle).