Bug 35817 - procmail: Buffer overflow (3.2)
procmail: Buffer overflow (3.2)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.2
Other Linux
: P5 normal (vote)
: UCS 3.2-3-errata
Assigned To: Janek Walkenhorst
Philipp Hahn
:
Depends on:
Blocks: 37238
  Show dependency treegraph
 
Reported: 2014-09-04 10:03 CEST by Moritz Muehlenhoff
Modified: 2014-12-08 15:38 CET (History)
1 user (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-09-04 10:03:23 CEST
CVE-2014-3618

A heap-based buffer overflow in the formail tool of procmail allows the execution of arbitrary code when processing a malformed mail.
Comment 1 Janek Walkenhorst univentionstaff 2014-09-18 18:21:45 CEST
Tests (amd64): OK
Advisory: 2014-09-17-procmail.yaml
Comment 2 Philipp Hahn univentionstaff 2014-09-19 14:24:22 CEST
OK: apt-cache policy procmail
OK: univention-install procmail
OK: zless /usr/share/doc/procmail/changelog.Debian.gz
OK: formail -I Received: -s procmail -m rc < ...
OK: 2014-09-17-procmail.yaml
OK: anource_errata -V 2014-09-17-procmail.yaml
Comment 3 Janek Walkenhorst univentionstaff 2014-09-19 17:56:04 CEST
http://errata.univention.de/ucs/3.2/210.html