Martin Schulze <joey(a)infodrom.org> writes:
Our maintainer told me that you may be the proper person to contact.
I propose to disclose this on February 10th.
Regards,
Joey
----- Forwarded message from Martin Schulze <joey(a)infodrom.org> -----
Date: Wed, 26 Jan 2005 12:22:22 +0100
From: Martin Schulze <joey(a)infodrom.org>
To: "Stephen J. Turnbull" <stephen(a)xemacs.org>
Cc: Debian Security Team <team(a)security.debian.org>
Subject: Re: Emacs issue
X-Folder: debian-security-private(a)lists.infodrom.org
Stephen J. Turnbull wrote:
> >>>>> "Martin" == Martin Schulze <joey(a)infodrom.org>
writes:
>
> Martin> can I talk confidential to you about a security issue in
> Martin> Emacs? Or could you tell me who I should talk to instead?
>
> If you mean XEmacs, you can start by writing to me, and I can tell you
> who knows the most about whatever it is. If you mean GNU Emacs, or
> Emacs in general, I would say write to rms(a)gnu.org.
The problem exists in both, unfortunately. I'm also discussing
this with Richard.
Max Vozeler discovered several format string vulnerabilities in the
movemail utility of Emacs. Via connecting to a malicious POP server
an attacker can execute arbitrary code under the privileges of group
mail (or worse if installed setuid root which is not the case for
Debian at least).
Max provided a patch for both Emacs and XEmacs. I'm attaching the
one for XEmacs.
CAN-2005-0100 was assigned to this issue.
CAN-2004-nnnn a unique identifier for a vulnerability in a software
package. The database behind this is maintained at MITRE's Common
Vulnerabilities and Exposures project <
http://cve.mitre.org/cve/>.
Details for such an id are available after a few days of quarantaine
at <
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-nnnn>.
Many vendors (both propriatery and Free Software) participate in this
database and assign the id to vulnerability reports or updates they
produce. These IDs help us security people generally for identifying
if a given package is fixed or if a given update fixes which problem.
Please mention this ID in the changelog and/or project announcements.
I would like to discuss a disclosure date that will give vendors (I
will get in touch with them) enough time to prepare updates. This
should be in roughly two weeks. Would that be ok for you?
APPROVE COMMIT 21.4
Thanks for the patch, Joey. I have applied it to the 21.4 source tree
and it will appear in the soon-to-be-released XEmacs 21.4.17, "Jumbo
Shrimp".
I applied the following ChangeLog entry:
2005-01-29 Vin Shelton <acs(a)xemacs.org>
* movemail.c (popmail): Security fixes.
Thank you,
Vin Shelton