Summary: | x11-plugins/pidgin-knotify: Remote command injection (CVE-2010-3088) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Matthias Petschick <razzle> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | alunduil, john, net-im, spatz, stefan.tell |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://code.google.com/p/pidgin-knotify/ | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Matthias Petschick
2010-09-12 14:24:22 UTC
Thank you for the report. We have just confirmed this issue. The package has been masked and will be removed in 30 days if upstream hasn't replied until then. I opened an upstream bug and someone posted a patch: http://code.google.com/p/pidgin-knotify/issues/detail?id=1 (In reply to comment #2) > I opened an upstream bug and someone posted a patch: > http://code.google.com/p/pidgin-knotify/issues/detail?id=1 > We will not apply this patch, as it merely is a workaround. It is very likely broken (implicit declaration of php_mblen, I didn't even look further). Besides it incorporates code licensed under the terms of the PHP license into GPL-2 code. These two licenses are not compatible. CVE-2010-3088 was assigned to this issue. I've written a patch some time ago to remove system() and instead use dbus, and upstream has given me access to the repository so I was planning to release a new version with that when RL shit happened and all my free time went to hell. I hope I can get to it this week. Any news on this one? Removed from main tree. Nothing to do for kde here anymore. CVE-2010-3088 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3088): The notify function in pidgin-knotify.c in the pidgin-knotify plugin 0.2.1 and earlier for Pidgin allows remote attackers to execute arbitrary commands via shell metacharacters in a message. since this was removed from the tree, this bug should probably just be marked closed correct? Thanks, everyone. GLSA draft is ready for review. This issue was resolved and addressed in GLSA 201402-27 at http://security.gentoo.org/glsa/glsa-201402-27.xml by GLSA coordinator Sergey Popov (pinkbyte). |