GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Thu Sep 04, 2008 8:26 pm Post subject: [ GLSA 200809-01 ] yelp: User-assisted execution of arbitrar |
|
|
Gentoo Linux Security Advisory
Title: yelp: User-assisted execution of arbitrary code (GLSA 200809-01)
Severity: normal
Exploitable: remote
Date: September 04, 2008
Bug(s): #234079
ID: 200809-01
Synopsis
A vulnerability in yelp can lead to the execution of arbitrary code when opening a URI, for example through Firefox.
Background
yelp is the default help browser for GNOME.
Affected Packages
Package: gnome-extra/yelp
Vulnerable: < 2.22.1-r2
Unaffected: >= 2.22.1-r2
Unaffected: >= 2.20.0-r1 < 2.20.1
Architectures: All supported architectures
Description
Aaron Grattafiori reported a format string vulnerability in the window_error() function in yelp-window.c.
Impact
A remote attacker can entice a user to open specially crafted "man:" or "ghelp:" URIs in yelp, or an application using yelp such as Firefox or Evolution, and execute arbitrary code with the privileges of that user.
Workaround
There is no known workaround at this time.
Resolution
All yelp users running GNOME 2.22 should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=gnome-extra/yelp-2.22.1-r2" | All yelp users running GNOME 2.20 should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=gnome-extra/yelp-2.20.0-r1" |
References
CVE-2008-3533 |
|