[arch-security] [ASA-201709-11] newsbeuter: arbitrary command execution

Levente Polyak anthraxx at archlinux.org
Mon Sep 18 14:36:31 UTC 2017


Arch Linux Security Advisory ASA-201709-11
==========================================

Severity: High
Date    : 2017-09-16
CVE-ID  : CVE-2017-12904 CVE-2017-14500
Package : newsbeuter
Type    : arbitrary command execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-401

Summary
=======

The package newsbeuter before version 2.9-8 is vulnerable to arbitrary
command execution.

Resolution
==========

Upgrade to 2.9-8.

# pacman -Syu "newsbeuter>=2.9-8"

The problems have been fixed upstream but no release is available yet.

Workaround
==========

None.

Description
===========

- CVE-2017-12904 (arbitrary command execution)

Improper Neutralization of Special Elements used in an OS Command in
bookmarking function of Newsbeuter versions 0.7 through 2.9 allows
remote attackers to perform user-assisted shell command execution by
crafting an RSS item that includes shell code in its title and/or URL.
When the user bookmarks such item the shell code will be executed.

- CVE-2017-14500 (arbitrary command execution)

Improper Neutralization of Special Elements used in an OS Command in
the podcast playback function of Podbeuter in Newsbeuter 0.3 through
2.9 allows remote attackers to perform user-assisted shell command
execution by crafting an RSS item with a media enclosure (i.e., a
podcast file) that includes shell metacharacters in its filename,
related to pb_controller.cpp and queueloader.cpp. When the user plays
the file in Podbeuter, the shell code will be executed.

Impact
======

A remote attacker can execute arbitrary commands on the affected host
by tricking a user into bookmarking a specially crafted RSS item or by
playing a podcast file that includes shell metacharacters in its
filename.

References
==========

https://github.com/akrennmair/newsbeuter/issues/591
https://github.com/akrennmair/newsbeuter/commit/3b84203448f077dff6f83ba986f916884184852c
https://github.com/akrennmair/newsbeuter/commit/d1460189f6f810ca9a3687af7bc43feb7f2af2d9
https://groups.google.com/forum/#!topic/newsbeuter/iFqSE7Vz-DE
https://github.com/akrennmair/newsbeuter/issues/598
https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260
https://github.com/akrennmair/newsbeuter/commit/26f5a4350f3ab5507bb8727051c87bb04660f333
https://security.archlinux.org/CVE-2017-12904
https://security.archlinux.org/CVE-2017-14500

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 866 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170918/819b6998/attachment.asc>


More information about the arch-security mailing list