Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 214204 - net-im/centerim URL message command execution (CVE-2008-1467)
Summary: net-im/centerim URL message command execution (CVE-2008-1467)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/29489/
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2008-03-22 01:10 UTC by Robert Buchholz (RETIRED)
Modified: 2008-03-29 20:21 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2008-03-22 01:10:12 UTC
Secunia:
Brian Fonfara has discovered a vulnerability in CenterIM, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to the improper handling of URLs received via a chat message. This can be exploited to execute arbitrary commands on a vulnerable system by tricking the user into opening a specially crafted URL containing shell escape characters.

http://milw0rm.com/exploits/5283
Comment 1 Lubomir Rintel 2008-03-24 10:09:16 UTC
This is not a bug. URLs are handled correctly and most likely the "exploit writer" is using either xfce terminal, or internet explorer on solaris :)
Comment 2 Pierre-Yves Rofes (RETIRED) gentoo-dev 2008-03-24 21:02:48 UTC
thanks for the tip, closing as invalid.
Comment 3 Lubomir Rintel 2008-03-25 17:23:11 UTC
Sorry; I was wrong. It is triggered by pressing F2.
I was not aware of the functionality.

Please reopen.
Comment 5 Robert Buchholz (RETIRED) gentoo-dev 2008-03-26 12:56:34 UTC
Sven, please see this for a discussion of the patch and Lubomir's correct patch:

http://thread.gmane.org/gmane.comp.security.oss.general/151/focus=169
Comment 6 Robert Buchholz (RETIRED) gentoo-dev 2008-03-26 13:04:20 UTC
(In reply to comment #5)
> Lubomir's correct patch:

That was oddly worded, I meant "other" patch.
No offense, Lubomir :-)

And in addition:
<lkundrak> btw, if you're using my centerim patch, you might want not to remove the browser setting like I did, but leave it in place, and spawn the user-configured browser instead of xdg-open
Comment 7 Sven Wegener gentoo-dev 2008-03-27 15:36:12 UTC
OK, there's now centerim-4.22.3-r1 in the tree. Mostly the patch from Lubomir, but we use the configured browser instead of xdg-open.
Comment 8 Robert Buchholz (RETIRED) gentoo-dev 2008-03-27 20:30:17 UTC
Arches, please test and mark stable:
=net-im/centerim-4.22.3-r1
Target keywords : "amd64 release x86"
Comment 9 Markus Meier gentoo-dev 2008-03-28 21:23:28 UTC
amd64/x86 stable (last arches)
Comment 10 Peter Volkov (RETIRED) gentoo-dev 2008-03-29 05:03:54 UTC
Fixed in release snapshot.
Comment 11 Robert Buchholz (RETIRED) gentoo-dev 2008-03-29 19:46:05 UTC
GLSA vote. Since the victim will usually see the url with the attacker's command, I tend to vote no.
Comment 12 Tobias Heinlein (RETIRED) gentoo-dev 2008-03-29 20:09:54 UTC
See comment #11 and closing.