blob: 30300ea6c211c05f010b9776a33d85a897de14f2 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200710-17">
<title>Balsa: Buffer overflow</title>
Balsa is vulnerable to a buffer overflow allowing for the user-assisted
execution of arbitrary code.
<product type="ebuild">balsa</product>
<announced>October 16, 2007</announced>
<revised>October 16, 2007: 01</revised>
<package name="mail-client/balsa" auto="yes" arch="*">
<unaffected range="ge">2.3.20</unaffected>
<vulnerable range="lt">2.3.20</vulnerable>
Balsa is a highly configurable email client for GNOME.
Evil Ninja Squirrel discovered a stack-based buffer overflow in the
ir_fetch_seq() function when receiving a long response to a FETCH
command (CVE-2007-5007).
<impact type="normal">
A remote attacker could entice a user to connect to a malicious or
compromised IMAP server, possibly leading to the execution of arbitrary
code with the rights of the user running Balsa.
There is no known workaround at this time.
All Balsa users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=mail-client/balsa-2.3.20&quot;</code>
<uri link="">CVE-2007-5007</uri>
<metadata tag="requester" timestamp="Wed, 26 Sep 2007 14:01:38 +0000">
<metadata tag="bugReady" timestamp="Wed, 26 Sep 2007 14:01:46 +0000">
<metadata tag="submitter" timestamp="Mon, 08 Oct 2007 00:14:17 +0000">