|
Message-ID: <50AA6532.6080504@redhat.com> Date: Mon, 19 Nov 2012 09:58:26 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: Fwd: [[Weechat-security] Security vulnerability in WeeChat 0.3.0 -> 0.3.9.1] -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 11/19/2012 02:57 AM, Guido Berhoerster wrote: > Hi, > > the weechat issue below should get a CVE, it describes a shell > injection vulnerability that affects weechat plugins using the > hook_process function. In addtion, upstream has a bug report at > https://savannah.nongnu.org/bugs/?37764 and the actual fix which is > included in 0.3.9.2 is at > http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff_plain;h=efb795c74fe954b9544074aafcebb1be4452b03a > > ----- Forwarded message from FlashCode <flashcode@...shtux.org> > ----- > > Date: Sun, 18 Nov 2012 14:18:12 +0100 From: FlashCode > <flashcode@...shtux.org> To: weechat-security@...gnu.org > Message-ID: <20121118131811.GH29073@...shtux.org> Subject: > [Weechat-security] Security vulnerability in WeeChat 0.3.0 -> > 0.3.9.1 > > Hi all, > > A security vulnerability has been fixed in WeeChat 0.3.9.2. This > problem affects all versions from 0.3.0 to 0.3.9.1. > > Untrusted command for function hook_process could lead to execution > of commands, because of shell expansions. > > This problem is only caused by some scripts calling function > hook_process (giving untrusted command), but the problem has been > fixed in WeeChat, for maximum safety: WeeChat will not use the > shell any more to execute command. > > If you are not using any script calling function hook_process, you > are not concerned by this problem. > > For more info, visit the WeeChat security page: > http://weechat.org/security/ Please use CVE-2012-5534 for this issue. > -- Cordialement / Best regards Sébastien. > > web: flashtux.org / weechat.org mail: flashcode@...shtux.org > irc: FlashCode @ irc.freenode.net xmpp: flashcode@...ber.fr > > > > ----- End forwarded message ----- > - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJQqmUyAAoJEBYNRVNeJnmT5vkP/0n0l7PEqOerIjZqWb9UQeA0 GBtgn2bhvaRXipOaxp7t1t/PhGdl8q+s0YM9Iw5FDQfNvhFPXcq8IVA3z32VQUsB ZvZc7pgi1/+EBiz0BpCvSokCO8ptdY171Ujoxbe1hRyoHoS2PAL7/y5CQTRYa/51 U2XDd5aQomOwMY9keY131VNHyCWtDvtEVpN4NwMR6IV2RKPFAwsz7I5aQCdJU2Lk PTSeZWjhchyn7HCKmYzuuYYF683/Buc1kxkFTAyIb6+TLV3wiiHbayJKpVUmjQrM wof6yIjjuOi/E++a8ds2XRsUcaDI/Os3wLW3YE1kxlqYiEn9ec1CVRLDRgdBAfsV /niVwy6A8EgCnmnEXlNt8fDs7zsbOUVLxHGBaaeO8lua/PPCJRldoJX0D1aD62AK YcAQCz6pIWNXWETR9UC0wbH1nLfp7UCEalWspzm+2IrYyQh8rm+R84zNMcnp/ya6 053VynxFSD9pwDUAKZbSg5Wtw9oya1U6d+Ggvse7rL3HZPmD8unsRzjsVFMoerKr nNfqavfXCaolnhRhy4f1dFNbJQMAkgjFm9kL1i2pMYNEua0vDjRPqVaqIA4Rcj1Q gyzqb6KQaMnje2b+bh5RM6DgRWEt8pWBiPhhuapofZuRSm4n/OiA56uXMtbgXS5B 9h5JSRib4sGnQAK3l06I =UuE2 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.