ASA-201709-11 generated external raw

[ASA-201709-11] newsbeuter: arbitrary command execution
Arch Linux Security Advisory ASA-201709-11 ========================================== Severity: High Date : 2017-09-16 CVE-ID : CVE-2017-12904 CVE-2017-14500 Package : newsbeuter Type : arbitrary command execution Remote : Yes Link : https://security.archlinux.org/AVG-401 Summary ======= The package newsbeuter before version 2.9-8 is vulnerable to arbitrary command execution. Resolution ========== Upgrade to 2.9-8. # pacman -Syu "newsbeuter>=2.9-8" The problems have been fixed upstream but no release is available yet. Workaround ========== None. Description =========== - CVE-2017-12904 (arbitrary command execution) Improper Neutralization of Special Elements used in an OS Command in bookmarking function of Newsbeuter versions 0.7 through 2.9 allows remote attackers to perform user-assisted shell command execution by crafting an RSS item that includes shell code in its title and/or URL. When the user bookmarks such item the shell code will be executed. - CVE-2017-14500 (arbitrary command execution) Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted shell command execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its filename, related to pb_controller.cpp and queueloader.cpp. When the user plays the file in Podbeuter, the shell code will be executed. Impact ====== A remote attacker can execute arbitrary commands on the affected host by tricking a user into bookmarking a specially crafted RSS item or by playing a podcast file that includes shell metacharacters in its filename. References ========== https://github.com/akrennmair/newsbeuter/issues/591 https://github.com/akrennmair/newsbeuter/commit/3b84203448f077dff6f83ba986f916884184852c https://github.com/akrennmair/newsbeuter/commit/d1460189f6f810ca9a3687af7bc43feb7f2af2d9 https://groups.google.com/forum/#!topic/newsbeuter/iFqSE7Vz-DE https://github.com/akrennmair/newsbeuter/issues/598 https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260 https://github.com/akrennmair/newsbeuter/commit/26f5a4350f3ab5507bb8727051c87bb04660f333 https://security.archlinux.org/CVE-2017-12904 https://security.archlinux.org/CVE-2017-14500