Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 19 Nov 2012 09:58:26 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: Fwd: [[Weechat-security] Security vulnerability
 in WeeChat 0.3.0 -> 0.3.9.1]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/19/2012 02:57 AM, Guido Berhoerster wrote:
> Hi,
> 
> the weechat issue below should get a CVE, it describes a shell 
> injection vulnerability that affects weechat plugins using the 
> hook_process function. In addtion, upstream has a bug report at 
> https://savannah.nongnu.org/bugs/?37764 and the actual fix which is
> included in 0.3.9.2 is at 
> http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff_plain;h=efb795c74fe954b9544074aafcebb1be4452b03a
>
>  ----- Forwarded message from FlashCode <flashcode@...shtux.org>
> -----
> 
> Date: Sun, 18 Nov 2012 14:18:12 +0100 From: FlashCode
> <flashcode@...shtux.org> To: weechat-security@...gnu.org 
> Message-ID: <20121118131811.GH29073@...shtux.org> Subject:
> [Weechat-security] Security vulnerability in WeeChat 0.3.0 -> 
> 0.3.9.1
> 
> Hi all,
> 
> A security vulnerability has been fixed in WeeChat 0.3.9.2. This
> problem affects all versions from 0.3.0 to 0.3.9.1.
> 
> Untrusted command for function hook_process could lead to execution
> of commands, because of shell expansions.
> 
> This problem is only caused by some scripts calling function 
> hook_process (giving untrusted command), but the problem has been 
> fixed in WeeChat, for maximum safety: WeeChat will not use the
> shell any more to execute command.
> 
> If you are not using any script calling function hook_process, you
> are not concerned by this problem.
> 
> For more info, visit the WeeChat security page: 
> http://weechat.org/security/

Please use CVE-2012-5534 for this issue.


> -- Cordialement / Best regards S├ębastien.
> 
> web: flashtux.org / weechat.org      mail: flashcode@...shtux.org 
> irc: FlashCode @ irc.freenode.net    xmpp: flashcode@...ber.fr
> 
> 
> 
> ----- End forwarded message -----
> 


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBAgAGBQJQqmUyAAoJEBYNRVNeJnmT5vkP/0n0l7PEqOerIjZqWb9UQeA0
GBtgn2bhvaRXipOaxp7t1t/PhGdl8q+s0YM9Iw5FDQfNvhFPXcq8IVA3z32VQUsB
ZvZc7pgi1/+EBiz0BpCvSokCO8ptdY171Ujoxbe1hRyoHoS2PAL7/y5CQTRYa/51
U2XDd5aQomOwMY9keY131VNHyCWtDvtEVpN4NwMR6IV2RKPFAwsz7I5aQCdJU2Lk
PTSeZWjhchyn7HCKmYzuuYYF683/Buc1kxkFTAyIb6+TLV3wiiHbayJKpVUmjQrM
wof6yIjjuOi/E++a8ds2XRsUcaDI/Os3wLW3YE1kxlqYiEn9ec1CVRLDRgdBAfsV
/niVwy6A8EgCnmnEXlNt8fDs7zsbOUVLxHGBaaeO8lua/PPCJRldoJX0D1aD62AK
YcAQCz6pIWNXWETR9UC0wbH1nLfp7UCEalWspzm+2IrYyQh8rm+R84zNMcnp/ya6
053VynxFSD9pwDUAKZbSg5Wtw9oya1U6d+Ggvse7rL3HZPmD8unsRzjsVFMoerKr
nNfqavfXCaolnhRhy4f1dFNbJQMAkgjFm9kL1i2pMYNEua0vDjRPqVaqIA4Rcj1Q
gyzqb6KQaMnje2b+bh5RM6DgRWEt8pWBiPhhuapofZuRSm4n/OiA56uXMtbgXS5B
9h5JSRib4sGnQAK3l06I
=UuE2
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ