Bug 37429 - mime-support: Shell command injection (4.0)
mime-support: Shell command injection (4.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.0
Other Linux
: P4 normal (vote)
: UCS 4.0-1
Assigned To: Moritz Muehlenhoff
Janek Walkenhorst
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2015-01-05 07:31 CET by Moritz Muehlenhoff
Modified: 2018-10-08 14:20 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 7.5 (CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2015-01-05 07:31:38 CET
+++ This bug was initially created as a clone of Bug #37428 +++

run-mailcap from mime-support performs insufficient sanitising which allows the execution of arbitrary shell commands when processing a malicious filename.

The base UCS desktop is not exposed to this vulnerability, so low impact.
Comment 1 Moritz Muehlenhoff univentionstaff 2015-02-02 12:42:24 CET
This is CVE-2014-7209
Comment 2 Moritz Muehlenhoff univentionstaff 2015-02-02 14:19:05 CET
This was fixed during the import of the Wheezy 7.8 point update in Bug 37511
Comment 3 Stefan Gohmann univentionstaff 2015-02-11 10:58:58 CET
UCS 4.0-1 has been released:
 http://docs.univention.de/release-notes-4.0-1-en.html
 http://docs.univention.de/release-notes-4.0-1-de.html

If this error occurs again, please use "Clone This Bug".