[ASA-201908-19] pigeonhole: arbitrary code execution

Jelle van der Waa jelle at archlinux.org
Thu Aug 29 18:27:00 UTC 2019


Arch Linux Security Advisory ASA-201908-19
==========================================

Severity: Critical
Date    : 2019-08-28
CVE-ID  : CVE-2019-11500
Package : pigeonhole
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1027

Summary
=======

The package pigeonhole before version 0.5.7.2-1 is vulnerable to
arbitrary code execution.

Resolution
==========

Upgrade to 0.5.7.2-1.

# pacman -Syu "pigeonhole>=0.5.7.2-1"

The problem has been fixed upstream in version 0.5.7.2.

Workaround
==========

None.

Description
===========

IMAP and ManageSieve protocol parsers in Dovecot before 2.3.7.2 and
Pigeonhole before 0.5.7.2 do not properly handle NUL byte when scanning
data in quoted strings, leading to out of bounds heap memory writes.

Impact
======

A remote, unauthenticated attacker can access sensitive information or
execute arbitrary code on the affected host via a crafted ManageSieve
command.

References
==========

https://dovecot.org/pipermail/dovecot-news/2019-August/000417.html
https://dovecot.org/pipermail/dovecot-news/2019-August/000418.html
https://github.com/dovecot/core/commit/85fcb895ca7f0bcb8ee72047fe0e1e78532ff90b
https://github.com/dovecot/core/commit/f904cbdfec25582bc5e2a7435bf82ff769f2526a
https://github.com/dovecot/pigeonhole/commit/7ce9990a5e6ba59e89b7fe1c07f574279aed922c
https://github.com/dovecot/pigeonhole/commit/4a299840cdb51f61f8d1ebc0210b19c40dfbc1cc
https://security.archlinux.org/CVE-2019-11500
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190829/b5ab035c/attachment-0001.sig>


More information about the arch-security mailing list