[arch-security] [ASA-201709-11] newsbeuter: arbitrary command execution
Arch Linux Security Advisory ASA-201709-11 ========================================== Severity: High Date : 2017-09-16 CVE-ID : CVE-2017-12904 CVE-2017-14500 Package : newsbeuter Type : arbitrary command execution Remote : Yes Link : https://security.archlinux.org/AVG-401 Summary ======= The package newsbeuter before version 2.9-8 is vulnerable to arbitrary command execution. Resolution ========== Upgrade to 2.9-8. # pacman -Syu "newsbeuter>=2.9-8" The problems have been fixed upstream but no release is available yet. Workaround ========== None. Description =========== - CVE-2017-12904 (arbitrary command execution) Improper Neutralization of Special Elements used in an OS Command in bookmarking function of Newsbeuter versions 0.7 through 2.9 allows remote attackers to perform user-assisted shell command execution by crafting an RSS item that includes shell code in its title and/or URL. When the user bookmarks such item the shell code will be executed. - CVE-2017-14500 (arbitrary command execution) Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted shell command execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its filename, related to pb_controller.cpp and queueloader.cpp. When the user plays the file in Podbeuter, the shell code will be executed. Impact ====== A remote attacker can execute arbitrary commands on the affected host by tricking a user into bookmarking a specially crafted RSS item or by playing a podcast file that includes shell metacharacters in its filename. References ========== https://github.com/akrennmair/newsbeuter/issues/591 https://github.com/akrennmair/newsbeuter/commit/3b84203448f077dff6f83ba986f9... https://github.com/akrennmair/newsbeuter/commit/d1460189f6f810ca9a3687af7bc4... https://groups.google.com/forum/#!topic/newsbeuter/iFqSE7Vz-DE https://github.com/akrennmair/newsbeuter/issues/598 https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e... https://github.com/akrennmair/newsbeuter/commit/26f5a4350f3ab5507bb8727051c8... https://security.archlinux.org/CVE-2017-12904 https://security.archlinux.org/CVE-2017-14500
participants (1)
-
Levente Polyak