Bug#345238: Shell command injection in delegate code (via file names)

2006-01-28 Thread Martin Schulze
Daniel Kobras wrote: > On Fri, Jan 27, 2006 at 10:59:34PM +0100, Martin Schulze wrote: > > Daniel Kobras wrote: > > > > Gnah. You are correct. I'm extending the list of forbidden characters > > > > by $(). > > > > > > Upstream has reverted the blacklist and instead went for an improved > > > ver

Bug#345238: Shell command injection in delegate code (via file names)

2006-01-27 Thread Daniel Kobras
On Fri, Jan 27, 2006 at 10:59:34PM +0100, Martin Schulze wrote: > Daniel Kobras wrote: > > > Gnah. You are correct. I'm extending the list of forbidden characters > > > by $(). > > > > Upstream has reverted the blacklist and instead went for an improved > > version of the symlink fix I added to

Bug#345238: Shell command injection in delegate code (via file names)

2006-01-27 Thread Martin Schulze
Daniel Kobras wrote: > > Gnah. You are correct. I'm extending the list of forbidden characters > > by $(). > > Upstream has reverted the blacklist and instead went for an improved > version of the symlink fix I added to ImageMagick in unstable. The patch > is more involved, but also more robust

Bug#345238: Shell command injection in delegate code (via file names)

2006-01-27 Thread Daniel Kobras
On Fri, Jan 27, 2006 at 10:32:51PM +0100, Martin Schulze wrote: > Daniel Kobras wrote: > > On Thu, Jan 05, 2006 at 01:49:11PM +0100, Daniel Kobras wrote: > > > On Fri, Dec 30, 2005 at 02:19:27PM +0100, Florian Weimer wrote: > > > > With some user interaction, this is exploitable through Gnus and >

Bug#345238: Shell command injection in delegate code (via file names)

2006-01-27 Thread Martin Schulze
Daniel Kobras wrote: > found 345238 4:5.4.4.5-1woody7 > found 345238 6:6.0.6.2-2.5 > thanks > > On Thu, Jan 05, 2006 at 01:49:11PM +0100, Daniel Kobras wrote: > > On Fri, Dec 30, 2005 at 02:19:27PM +0100, Florian Weimer wrote: > > > With some user interaction, this is exploitable through Gnus and

Bug#345238: Shell command injection in delegate code (via file names)

2006-01-27 Thread Daniel Kobras
found 345238 4:5.4.4.5-1woody7 found 345238 6:6.0.6.2-2.5 thanks On Thu, Jan 05, 2006 at 01:49:11PM +0100, Daniel Kobras wrote: > On Fri, Dec 30, 2005 at 02:19:27PM +0100, Florian Weimer wrote: > > With some user interaction, this is exploitable through Gnus and > > Thunderbird. I think this warr

Bug#345238: Shell command injection in delegate code (via file names)

2006-01-17 Thread Daniel Kobras
On Thu, Jan 05, 2006 at 02:04:39PM +0100, Florian Weimer wrote: > A better fix would be to bypass the shell and invoke the delegate > directly (using fork and execve). If this is not feasible, the file > name should be translated according to this pseudo-code: I went for an even more simple fix:

Bug#345238: Shell command injection in delegate code (via file names)

2006-01-05 Thread Florian Weimer
* Daniel Kobras: > tag 345238 + patch > thanks > > On Fri, Dec 30, 2005 at 02:19:27PM +0100, Florian Weimer wrote: >> With some user interaction, this is exploitable through Gnus and >> Thunderbird. I think this warrants increasing the severity to >> "grave". > > Here's the vanilla fix from upstr

Bug#345238: Shell command injection in delegate code (via file names)

2006-01-05 Thread Daniel Kobras
tag 345238 + patch thanks On Fri, Dec 30, 2005 at 02:19:27PM +0100, Florian Weimer wrote: > With some user interaction, this is exploitable through Gnus and > Thunderbird. I think this warrants increasing the severity to > "grave". Here's the vanilla fix from upstream SVN, stripped off whitespac

Bug#345238: Shell command injection in delegate code (via file names)

2006-01-02 Thread Florian Weimer
retitle 345238 [CVE-2005-4601] Shell command injection in delegate code (via file names) thanks This issue has been assigned CVE-2005-4601. Please mention this identifier in the changelog when fixing this bug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Tro

Bug#345238: Shell command injection in delegate code (via file names)

2005-12-30 Thread Florian Weimer
severity 345238 grave thanks With some user interaction, this is exploitable through Gnus and Thunderbird. I think this warrants increasing the severity to "grave". -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#345238: Shell command injection in delegate code (via file names)

2005-12-29 Thread Florian Weimer
Package: imagemagick Version: 6.2.4.5-0.3 Tags: security The delegate code in Imagemagick is vulnerable to shell command injection, using specially crafted file names: $ cp /usr/lib/openoffice/share/template/en-US/wizard/bitmap/germany.wmf \ '" ; echo "Hi!" >&2; : "'.gif $ display '" ; echo "Hi