[CVE-2008-3907] Arbitrary code execution by crafted item URLs

Bug #275019 reported by William Grant
256
Affects Status Importance Assigned to Milestone
newsbeuter (Ubuntu)
Fix Released
High
William Grant
Hardy
Fix Released
High
William Grant
Intrepid
Fix Released
High
William Grant

Bug Description

Binary package hint: newsbeuter

"The open-in-browser command in newsbeuter before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a feed URL."

I've requested a sync for Intrepid, and am preparing a patch for Hardy.

CVE References

William Grant (wgrant)
Changed in newsbeuter:
assignee: nobody → wgrant
importance: Undecided → High
status: New → In Progress
assignee: nobody → wgrant
importance: Undecided → High
status: New → Triaged
Revision history for this message
William Grant (wgrant) wrote :

Here's the Hardy debdiff. Everything works, except the exploit.

Changed in newsbeuter:
status: Triaged → In Progress
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Thanks for the patch! Processing the hardy debdiff today.

Changed in newsbeuter:
status: In Progress → Fix Committed
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

0.9.1-1+lenny3 is in Intrepid now, and contains the patch to view.cpp

Changed in newsbeuter:
status: In Progress → Fix Released
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

newsbeuter (0.7-1ubuntu0.1) hardy-security; urgency=low

  * SECURITY UPDATE: arbitrary code execution via crafted item URLS.
    - src/view.cpp: Escape single quotes in item URLs. Fixes arbitrary
      code execution. Patch from Debian.
    - References:
      + CVE-2008-3907

Changed in newsbeuter:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.