Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <50AA6532.6080504@redhat.com>
Date: Mon, 19 Nov 2012 09:58:26 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: Fwd: [[Weechat-security] Security vulnerability
 in WeeChat 0.3.0 -> 0.3.9.1]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/19/2012 02:57 AM, Guido Berhoerster wrote:
> Hi,
> 
> the weechat issue below should get a CVE, it describes a shell 
> injection vulnerability that affects weechat plugins using the 
> hook_process function. In addtion, upstream has a bug report at 
> https://savannah.nongnu.org/bugs/?37764 and the actual fix which is
> included in 0.3.9.2 is at 
> http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff_plain;h=efb795c74fe954b9544074aafcebb1be4452b03a
>
>  ----- Forwarded message from FlashCode <flashcode@...shtux.org>
> -----
> 
> Date: Sun, 18 Nov 2012 14:18:12 +0100 From: FlashCode
> <flashcode@...shtux.org> To: weechat-security@...gnu.org 
> Message-ID: <20121118131811.GH29073@...shtux.org> Subject:
> [Weechat-security] Security vulnerability in WeeChat 0.3.0 -> 
> 0.3.9.1
> 
> Hi all,
> 
> A security vulnerability has been fixed in WeeChat 0.3.9.2. This
> problem affects all versions from 0.3.0 to 0.3.9.1.
> 
> Untrusted command for function hook_process could lead to execution
> of commands, because of shell expansions.
> 
> This problem is only caused by some scripts calling function 
> hook_process (giving untrusted command), but the problem has been 
> fixed in WeeChat, for maximum safety: WeeChat will not use the
> shell any more to execute command.
> 
> If you are not using any script calling function hook_process, you
> are not concerned by this problem.
> 
> For more info, visit the WeeChat security page: 
> http://weechat.org/security/

Please use CVE-2012-5534 for this issue.


> -- Cordialement / Best regards Sébastien.
> 
> web: flashtux.org / weechat.org      mail: flashcode@...shtux.org 
> irc: FlashCode @ irc.freenode.net    xmpp: flashcode@...ber.fr
> 
> 
> 
> ----- End forwarded message -----
> 


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=UuE2
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.