Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 23 Nov 2009 19:59:41 +0100
From: Alex Legler <>
Subject: CVE request: Argument injections in multiple PEAR packages


here are a couple of issues in PEAR packages that do not yet have a CVE

1. PEAR-Mail Mail::Send() Argument Injection when using Sendmail

Secunia writes:
"The sendmail implementation of the "Mail::Send()" method does not
properly sanitise the "from" parameter before invoking sendmail,
which can be exploited to pass arbitrary arguments to the sendmail

Contrary to Secunia, this does not seem to be completely fixed yet (see
Raphael Geissert's comment in the upstream bug)
Upstream bug:
First commit:
Gentoo bug:

2. PEAR-Net_Ping < 2.4.5 ping() Argument Injection via $host

Upstream writes:
"When input from forms are used directly, the attacker could pass
variables that would allow him to execute remote arbitrary command

Upstream advisory:
Gentoo bug:

3. PEAR-Net_Traceroute < 0.21.2 traceroute() Argument Injection via

See above, same advisory.

Gentoo bug:

Thanks, Alex

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ