blob: 591c70a4174ea7fb35e0e7b246a0d16df4e396c5 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200801-03">
<title>Claws Mail: Insecure temporary file creation</title>
Claws Mail uses temporary files in an insecure manner, allowing for a
symlink attack.
<product type="ebuild">claws-mail</product>
<announced>January 09, 2008</announced>
<revised>January 09, 2008: 01</revised>
<package name="mail-client/claws-mail" auto="yes" arch="*">
<unaffected range="ge">3.0.2-r1</unaffected>
<vulnerable range="lt">3.0.2-r1</vulnerable>
Claws Mail is a GTK based e-mail client.
Nico Golde from Debian reported that the script that is
part of the Claws Mail tools creates temporary files in an insecure
<impact type="normal">
A local attacker could exploit this vulnerability to conduct symlink
attacks to overwrite files with the privileges of the user running
Claws Mail.
There is no known workaround at this time.
All Claws Mail users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=mail-client/claws-mail-3.0.2-r1&quot;</code>
<uri link="">CVE-2007-6208</uri>
<metadata tag="requester" timestamp="Sun, 06 Jan 2008 23:01:06 +0000">
<metadata tag="submitter" timestamp="Tue, 08 Jan 2008 23:07:07 +0000">
<metadata tag="bugReady" timestamp="Tue, 08 Jan 2008 23:07:18 +0000">