[CVE-2008-3962] allow remote attackers to obtain sensitive information

Bug #278978 reported by Marco Rodrigues
262
Affects Status Importance Assigned to Milestone
ssmtp (Debian)
Fix Released
Unknown
ssmtp (Ubuntu)
Fix Released
High
Unassigned
Dapper
Fix Released
Undecided
Nicolas Valcarcel
Gutsy
Fix Released
Undecided
Nicolas Valcarcel
Hardy
Fix Released
Undecided
Nicolas Valcarcel

Bug Description

Binary package hint: ssmtp

The from_format function in ssmtp.c in ssmtp 2.61 and 2.62, in certain configurations, uses uninitialized memory for the From: field of an e-mail message, which might allow remote attackers to obtain sensitive information (memory contents) in opportunistic circumstances by reading a message.

This fix was already applied in Debian.

Changed in ssmtp:
status: Unknown → Fix Released
Stefan Ebner (sebner)
Changed in ssmtp:
assignee: nobody → sebner
status: New → In Progress
Revision history for this message
Stefan Ebner (sebner) wrote :
Changed in ssmtp:
assignee: sebner → nobody
status: In Progress → Confirmed
Revision history for this message
James Westby (james-w) wrote :

Hi Stefan,

Please could you edit the changelog entry to be more like the
template described in

  https://wiki.ubuntu.com/SecurityUpdateProcedures

could you also check for other guidelines in there you should
follow considering this is a development release.

Are other releases vulnerable?

Thanks,

James

Revision history for this message
Stefan Ebner (sebner) wrote :

Updated for intrepid. If it's okay I'll start if the SRU's.

Revision history for this message
Stefan Ebner (sebner) wrote :

Updated for intrepid. If it's okay I'll start if the SRU's.

Revision history for this message
James Westby (james-w) wrote :

Hey Stefan,

The change looks good. However, the new bug for the new patch
isn't marked as a security vulnerability, and doesn't have a CVE
attached. While it may well be a security bug can you please
talk to the security team about ensuring it has a CVE etc.

Thanks,

James

Revision history for this message
Nicolas Valcarcel (nvalcarcel) wrote :

Stefan, thanks for your patch, here are my bits:
- The indentation in the changelog is quite odd, please fix it according to the examples on the wiki
- You don't put the information about the CVE (in the bug which has it), please add it
- There is a ":" missing after debian/patches/03_fix_buffer_overflow

P.S: yes i know is pretty nitpicky, but that's how we work in the security team.

Revision history for this message
Scott Kitterman (kitterman) wrote :

Milestoning so teaching doesn't cause us to forget to upload before release.

Changed in ssmtp:
importance: Undecided → High
milestone: none → ubuntu-8.10
Revision history for this message
Stefan Ebner (sebner) wrote :

hehe, hope it's ok now

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package ssmtp - 2.62-1ubuntu3

---------------
ssmtp (2.62-1ubuntu3) intrepid; urgency=low

  * SECURITY UPDATE: allow remote attackers to obtain sensitive
    information (LP: #278978)
  * debian/patches/02-CVE-2008-3962: adjust in ssmtp.c to fix
    unitialized memory disclosure.
  * SECURITY UPDATE: Buffer overflow (LP: #282424)
  * debian/patches/03_fix_buffer_overflow: adjust ssmtp.c to fix
    a buffer overflow with using 2 bytes in length instead of one in buffer.
  * References:
    CVE-2008-3962
    http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498366

 -- Stefan Ebner <email address hidden> Tue, 07 Oct 2008 16:22:39 +0200

Changed in ssmtp:
status: Confirmed → Fix Released
Revision history for this message
Nicolas Valcarcel (nvalcarcel) wrote :

debdiff for hardy

Changed in ssmtp:
status: New → In Progress
assignee: nobody → nvalcarcel
Revision history for this message
Nicolas Valcarcel (nvalcarcel) wrote :

patch for gutsy

Changed in ssmtp:
assignee: nobody → nvalcarcel
status: New → In Progress
Changed in ssmtp:
milestone: ubuntu-8.10 → none
Revision history for this message
Nicolas Valcarcel (nvalcarcel) wrote :
Revision history for this message
Nicolas Valcarcel (nvalcarcel) wrote :

patch fro dapper

Changed in ssmtp:
assignee: nobody → nvalcarcel
status: New → In Progress
Revision history for this message
Kees Cook (kees) wrote :

Echoing IRC discussion: the Dapper patch needs to not use dpatch (should be patched inline unless there is a good reason to change build-deps).

Changed in ssmtp:
status: In Progress → Incomplete
Revision history for this message
Nicolas Valcarcel (nvalcarcel) wrote :

Updating dapper patch.

Revision history for this message
Nicolas Valcarcel (nvalcarcel) wrote :

New patch for dapper.

Kees Cook (kees)
Changed in ssmtp:
status: Incomplete → In Progress
Revision history for this message
Nicolas Valcarcel (nvalcarcel) wrote :

I'm performing tests using the following configuration:

<email address hidden>
mailhub=smtp.gmail.com:587
AuthUser=user
AuthPass=pass
UseSTARTTLS=YES

in hardy it worked ok, and had the same behavior with hardy's package and the new update. Still need to do the PoC

Revision history for this message
Nicolas Valcarcel (nvalcarcel) wrote :

Tested for hardy and it's ok.

Revision history for this message
Nicolas Valcarcel (nvalcarcel) wrote :

The change affected the from_format function, adding an exception in the case FromLineOverride is set to No and 'gecos' pointer is not initialized. The affected function is the one formating the "From:" field.

Revision history for this message
Nicolas Valcarcel (nvalcarcel) wrote :

dapper tests worked ok.

Revision history for this message
Kees Cook (kees) wrote :

All releases published in -security. Thanks nxvl!

Changed in ssmtp:
status: In Progress → Fix Released
status: In Progress → Fix Released
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.