blob: 4a12d03eddbab4297da6e3816209c96a788a71e5 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200801-14">
<title>Blam: User-assisted execution of arbitrary code</title>
<synopsis>
Blam doesn't properly handle environment variables, potentially allowing a
local attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">blam</product>
<announced>January 27, 2008</announced>
<revised>January 27, 2008: 01</revised>
<bug>199841</bug>
<access>local</access>
<affected>
<package name="net-news/blam" auto="yes" arch="*">
<unaffected range="ge">1.8.4</unaffected>
<vulnerable range="lt">1.8.4</vulnerable>
</package>
</affected>
<background>
<p>
Blam is an RSS and Atom feed reader for GNOME written in C#.
</p>
</background>
<description>
<p>
The "/usr/bin/blam" script sets the "LD_LIBRARY_PATH" environment
variable incorrectly, which might result in the current working
directory (.) being included when searching for dynamically linked
libraries of the Mono Runtime application.
</p>
</description>
<impact type="normal">
<p>
A local attacker could entice a user to run Blam in a directory
containing a specially crafted library file which could result in the
execution of arbitrary code with the privileges of the user running
Blam.
</p>
</impact>
<workaround>
<p>
Do not run Blam from an untrusted working directory.
</p>
</workaround>
<resolution>
<p>
All Blam users should upgrade to the latest version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-news/blam-1.8.4&quot;</code>
</resolution>
<references>
<uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4790">CVE-2005-4790</uri>
</references>
<metadata tag="submitter" timestamp="Sun, 20 Jan 2008 00:54:46 +0000">
rbu
</metadata>
<metadata tag="bugReady" timestamp="Sun, 20 Jan 2008 00:55:57 +0000">
rbu
</metadata>
</glsa>