Lucene search

K
gentooGentoo FoundationGLSA-200807-15
HistoryJul 31, 2008 - 12:00 a.m.

Pan: User-assisted execution of arbitrary code

2008-07-3100:00:00
Gentoo Foundation
security.gentoo.org
9

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.041 Low

EPSS

Percentile

92.2%

Background

Pan is a newsreader for the GNOME desktop.

Description

Pavel Polischouk reported a boundary error in the PartsBatch class when processing .nzb files.

Impact

A remote attacker could entice a user to open a specially crafted .nzb file, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All Pan users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-nntp/pan-0.132-r3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-nntp/pan<Β 0.132-r3UNKNOWN

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.041 Low

EPSS

Percentile

92.2%