Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat, 16 Sep 2017 21:05:18 +0300
From: Alexander Batischev <eual.jp@...il.com>
To: oss-security@...ts.openwall.com
Subject: Podbeuter podcast fetcher: remote code execution

Podbeuter is a podcast fetcher and player that's developed alongside 
with Newsbeuter, an RSS/Atom feed reader for text consoles.

Versions 0.3 through 2.9 are vulnerable to remote code execution. An 
attacker can craft an RSS item where the name of media enclosure
(the podcast file) contains shell code. When user plays the file in 
Podbeuter, the shell code will be executed.

A commit fixing the vulnerability in Git: 
https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260

A patch for Podbeuter 2.9: 
https://github.com/akrennmair/newsbeuter/commit/26f5a4350f3ab5507bb8727051c87bb04660f333

Upstream issue: https://github.com/akrennmair/newsbeuter/issues/598

I've requested a CVE from MITRE on August 27th, but haven't heard back 
yet, so decided to disclose without a number.

-- 
Regards,
Alexander Batischev

PGP key 356961A20C8BFD03
Fingerprint: CE6C 4307 9348 58E3 FD94  A00F 3569 61A2 0C8B FD03


[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ