Skip to navigation

Security Advisory sylpheed security update

Advisory: RHSA-2005:303-05
Type: Security Advisory
Severity: Important
Issued on: 2005-03-18
Last updated on: 2005-03-18
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2005-0667

Details

An updated sylpheed package that fixes a buffer overflow issue is now
available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Sylpheed is a GTK+ based fast email client.

A buffer overflow bug has been found in the way Sylpheed handles non-ASCII
characters in the header of a message to which a victim replies. A
carefully crafted email message could potentially allow an attacker to
execute arbitrary code on a victim's machine if they reply to such a
message. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2005-0667 to this issue.

Users of Sylpheed should upgrade to this updated package, which contains a
backported patch, and is not vulnerable to this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/sylpheed/0.5.0-3.EL21.1/i386/sylpheed-0.5.0-3.EL21.1.i386.rpm
Missing file
    MD5: 4cc680f7f44dc289cfe8350cc5d2a5f8
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/sylpheed/0.5.0-3.EL21.1/ia64/sylpheed-0.5.0-3.EL21.1.ia64.rpm
Missing file
    MD5: 7b067a34374921415a498662db9c98ee
 
Red Hat Enterprise Linux ES (v. 2.1)

IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/sylpheed/0.5.0-3.EL21.1/i386/sylpheed-0.5.0-3.EL21.1.i386.rpm
Missing file
    MD5: 4cc680f7f44dc289cfe8350cc5d2a5f8
 
Red Hat Enterprise Linux WS (v. 2.1)

IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/sylpheed/0.5.0-3.EL21.1/i386/sylpheed-0.5.0-3.EL21.1.i386.rpm
Missing file
    MD5: 4cc680f7f44dc289cfe8350cc5d2a5f8
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/sylpheed/0.5.0-3.EL21.1/ia64/sylpheed-0.5.0-3.EL21.1.ia64.rpm
Missing file
    MD5: 7b067a34374921415a498662db9c98ee
 

Bugs fixed (see bugzilla for more information)

150687 - CAN-2005-0667 sylpheed buffer overflow


References


Keywords

buffer, overflow


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/