FS#71292 - [libesmtp] CVE-2019-19977

Attached to Project: Community Packages
Opened by loqs (loqs) - Friday, 18 June 2021, 22:46 GMT
Last edited by Antonio Rojas (arojas) - Saturday, 19 June 2021, 07:13 GMT
Task Type Bug Report
Category Packages
Status Closed
Assigned To No-one
Architecture All
Severity Medium
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Description:
libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read.
Fixed by [2]. Assuming [3] is the same project as was [4]. Then updating to the 1.1 release [5] resolves the issue.
This would also fix  FS#53809 .
The new release switched from the custom libesmtp-config utility to pkgconfig support which requires changes in syslog-ng to support [6][7].
[8] Applies the required patch from the PR, also removes libtool overlinking.

Additional info:
* libesmtp 1.0.6-7
[1] https://nvd.nist.gov/vuln/detail/CVE-2019-19977
[2] https://github.com/libesmtp/libESMTP/commit/8c85278d28ff4da32106714a1420371fe37ef349
[3] https://github.com/libesmtp/libESMTP
[4] http://www.stafford.uklinux.net/libesmtp/
[5] PKGBUILD.diff.libesmtp
[6] https://github.com/syslog-ng/syslog-ng/pull/3669
[7] https://github.com/syslog-ng/syslog-ng/pull/3669/commits/b8284f8ecac588f6a321c779cce06cbe182611a5
[8] PKGBUILD.diff.libesmtp
This task depends upon

Closed by  Antonio Rojas (arojas)
Saturday, 19 June 2021, 07:13 GMT
Reason for closing:  Fixed

Loading...