You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
69 lines
2.1 KiB
69 lines
2.1 KiB
<?xml version="1.0" encoding="utf-8"?>
|
|
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
|
<glsa id="200810-03">
|
|
<title>libspf2: DNS response buffer overflow</title>
|
|
<synopsis>
|
|
A memory management error in libspf2 might allow for remote execution of
|
|
arbitrary code.
|
|
</synopsis>
|
|
<product type="ebuild">libspf2</product>
|
|
<announced>2008-10-30</announced>
|
|
<revised count="01">2008-10-30</revised>
|
|
<bug>242254</bug>
|
|
<access>remote</access>
|
|
<affected>
|
|
<package name="mail-filter/libspf2" auto="yes" arch="*">
|
|
<unaffected range="ge">1.2.8</unaffected>
|
|
<vulnerable range="lt">1.2.8</vulnerable>
|
|
</package>
|
|
</affected>
|
|
<background>
|
|
<p>
|
|
libspf2 is a library that implements the Sender Policy Framework,
|
|
allowing mail transfer agents to make sure that an email is authorized
|
|
by the domain name that it is coming from. Currently, only the exim MTA
|
|
uses libspf2 in Gentoo.
|
|
</p>
|
|
</background>
|
|
<description>
|
|
<p>
|
|
libspf2 uses a fixed-length buffer to receive DNS responses and does
|
|
not properly check the length of TXT records, leading to buffer
|
|
overflows.
|
|
</p>
|
|
</description>
|
|
<impact type="high">
|
|
<p>
|
|
A remote attacker could store a specially crafted DNS entry and entice
|
|
a user or automated system using libspf2 to lookup that SPF entry (e.g.
|
|
by sending an email to the MTA), possibly allowing for the execution of
|
|
arbitrary code.
|
|
</p>
|
|
</impact>
|
|
<workaround>
|
|
<p>
|
|
There is no known workaround at this time.
|
|
</p>
|
|
</workaround>
|
|
<resolution>
|
|
<p>
|
|
All libspf2 users should upgrade to the latest version:
|
|
</p>
|
|
<code>
|
|
# emerge --sync
|
|
# emerge --ask --oneshot --verbose ">=mail-filter/libspf2-1.2.8"</code>
|
|
</resolution>
|
|
<references>
|
|
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2469">CVE-2008-2469</uri>
|
|
</references>
|
|
<metadata tag="requester" timestamp="2008-10-18T16:51:58Z">
|
|
rbu
|
|
</metadata>
|
|
<metadata tag="submitter" timestamp="2008-10-19T19:27:11Z">
|
|
rbu
|
|
</metadata>
|
|
<metadata tag="bugReady" timestamp="2008-10-23T13:43:28Z">
|
|
rbu
|
|
</metadata>
|
|
</glsa>
|