Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 103358 - mail-client/elm: Buffer Overflow in SMTP 'Expires' Header
Summary: mail-client/elm: Buffer Overflow in SMTP 'Expires' Header
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.securitytracker.com/alerts...
Whiteboard: B2 [ebuild?] DerCorny
Keywords:
: 112582 (view as bug list)
Depends on:
Blocks:
 
Reported: 2005-08-22 11:12 UTC by Jean-François Brunette (RETIRED)
Modified: 2005-11-15 00:33 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jean-François Brunette (RETIRED) gentoo-dev 2005-08-22 11:12:12 UTC
Not sure if 2.4* is affected
----------------------------------

Version(s): 2.5 PL5, 2.5 PL6, and 2.5 PL7; possibly others
Description:  A vulnerability was reported in Elm. A remote user can cause
arbitrary code to be executed on the target user's system.

The software does not properly parse SMTP Expires header lines. A remote user
can send e-mail with a specially crafted Expires header value. Then, when the
target user loads Elm or views the inbox, a buffer overflow will be triggered
and arbitrary code may be executed. The code will run with the privileges of the
target user.

Ulf Harnhammar reported this vulnerability.
Impact:  A remote user can cause arbitrary code to be executed on the target
user's system with the privileges of the target user.

Solution:  Elm 2.5 PL8 (available at ftp://ftp.virginia.edu/pub/elm/) is not
vulnerable.
Comment 1 Stefan Cornelius (RETIRED) gentoo-dev 2005-08-22 11:30:36 UTC
net-mail, please verify if we are affected and bump if necessary.
Comment 2 Andrej Kacian (RETIRED) gentoo-dev 2005-08-22 13:17:50 UTC
I can open the supplied test message in elm-2.4_rc100-r1 (the only version
provided by us) just fine. What exactly is it supposed to do, anyway?
Comment 3 Stefan Cornelius (RETIRED) gentoo-dev 2005-08-22 14:42:18 UTC
Ok, i then assume that we are not vulnerable. I also had a short (really short,
so don't take this as last word) look at the code and couldn't find the file
that needs fixing or something that could come close so i'm closing this as
invalid. Feel free to reopen if you disagree.
Comment 4 Thierry Carrez (RETIRED) gentoo-dev 2005-11-15 00:33:53 UTC
*** Bug 112582 has been marked as a duplicate of this bug. ***