oss-sec mailing list archives
Re: CVE Request: sup MUA Command Injection
From: Kurt Seifried <kseifried () redhat com>
Date: Tue, 29 Oct 2013 14:44:29 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 10/29/2013 01:30 PM, Salvatore Bonaccorso wrote:
Hi, On full-disclosure list there was reported a command injection vulnerability in 'sup', a console-based email client. [0] http://rubyforge.org/pipermail/sup-talk/2013-October/004996.html [1] http://seclists.org/fulldisclosure/2013/Oct/272 For reference quoting the upstream announce: ----cut---------cut---------cut---------cut---------cut---------cut-----
Greetings,
Security advisory (#SBU1) for Sup We have been notified of an potential exploit in the somewhat careless way Sup treats attachment metadata in received e-mails. The issues should now be fixed and I have released Sup 0.13.2.1 and 0.14.1.1 which incorporates these fixes. Please upgrade immediately and also ensure that your mime-decode or mime-view hooks are secure [0], [1]. This is specifically related to using quotes (',") around filename or content_type which is already escaped using Ruby Shellwords.escape - this means that the string (content_type, filename) is intended to be used _without_ any further quotes. Please make sure that if you use .mailcap (non OSX systems), you do not quote the string. Credit goes to: joernchen of Phenoelit (http://phenoelit.de) who discovered and suggested fixes for these issues. [0] https://github.com/sup-heliotrope/sup/wiki/Viewing-Attachments [1] https://github.com/sup-heliotrope/sup/wiki/Secure-usage-of-Sup You can use 'gem' to upgrade or install sup. Please report any issues to: https://github.com/sup-heliotrope/sup/issues Regards, Gaute ----cut---------cut---------cut---------cut---------cut---------cut----- Upstream fixed (as mentioned in announce) the issue in 0.13.2.1 and 0.14.1.1. Commits: [2] https://github.com/sup-heliotrope/sup/compare/release-0.13.2...release-0.13.2.1
[3] https://github.com/sup-heliotrope/sup/compare/release-0.14.1...release-0.14.1.1
Could a CVE be assigned for this issue? Regards, Salvatore
Please use CVE-2013-4478 for this issue. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAEBAgAGBQJScB4tAAoJEBYNRVNeJnmT3lIP/jgwlNSUJF/OotzGXbjmHOYy kehaEwHRkUFi4mhb4uQSJUG69MFKkNb+6c1Cs3GMfPtChs5A1D2NOJAaEZ3LExjO CMHdvryhYuQepCdImHgJ9RhMcFSqmAQ1CM/Uo2DNRPko5fcp//QwZHeNEPvbnK5w d13Jw6exmXJ+iaanXyGYUkHY3btyY17i4GYdQN7ToTusULLk/JJ6KtHLhAZRQaK3 OxI84NtFFTDAtgLhDQUdCN8jd0P0iTjvoWsFsASLVMg0XDNcQ5yCR09oIQK9Wz38 nRpyUah1bkVBMUL67oTCgu5bRAMAwB3j6x14/b5utfFVIuSiRRh0RQEqwy2LYCUs yJBRTt+lpKAgroX+q4vNMqPkHqLLEayaI2I4xFR6YrR4s326aXenTfAKmC5LgHxL OSvm2p8kExjHTlF+DCRErNUMDdLGS64D4DlViWF4wk6h6O0FxtzOFoVhgIV6A7pr fiMzRmVX5SOId3hz+dmyjXMq1qcSn3YECDtCjj+fc5soeknhV/JWJN8oA88nwyPY 8TQsERRdfOL0rtVkT3z+oYRczAZYNIgxjE9IDhliAlSwo39Th4K6AbyM7ohsdNd1 gGVi1fzz0T5mPWDi/HCoBN9iZkOQeqK1QCiQChefzcqEtQTPo+QkMaB5Wj7yJs2F uax9T6urcVzVqJFJZqml =CJu3 -----END PGP SIGNATURE-----
Current thread:
- CVE Request: sup MUA Command Injection Salvatore Bonaccorso (Oct 29)
- Re: CVE Request: sup MUA Command Injection Kurt Seifried (Oct 29)
- Re: CVE Request: sup MUA Command Injection Murray McAllister (Oct 29)
- Re: CVE Request: sup MUA Command Injection Kurt Seifried (Oct 29)
- Re: CVE Request: sup MUA Command Injection Murray McAllister (Oct 29)
- Re: CVE Request: sup MUA Command Injection Kurt Seifried (Oct 29)