Summary
joernchen of Phenoelit discovered two command injection flaws in Sup, a console-based email client. An attacker might execute arbitrary command if the user opens a maliciously crafted email.
CVE-2013-4478
Sup wrongly handled the filename of attachments.
CVE-2013-4479
Sup did not sanitize the content-type of attachments.
Solution
For the oldstable distribution (squeeze), these problems have been fixed in version 0.11-2+nmu1+deb6u1.
For the stable distribution (wheezy), these problems have been fixed in version 0.12.1+git20120407.aaa852f-1+deb7u1.
We recommend that you upgrade your sup-mail packages.
Insight
Sup is a console-based email client for people with a lot of email. It supports tagging, very fast full-text search, automatic contact-list management, custom code insertion via a hook system, and more. If you're the type of person who treats email as an extension of your long-term memory, Sup is for you.
Affected
sup-mail on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-4478, CVE-2013-4479 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities