First published: Wed Oct 03 2012(Updated: )
Description of problem: A specific mail in the user mbox file cause claws-mail to crash reliabily. Version-Release number of selected component: claws-mail-3.8.1-1.fc17 Additional info: libreport version: 2.0.14 abrt_version: 2.0.13 backtrace_rating: 4 cmdline: claws-mail crash_function: strchr kernel: 3.5.4-2.fc17.x86_64 truncated backtrace: :Thread no. 1 (10 frames) : #0 strchr at ../sysdeps/x86_64/strchr.S:33 : #1 parse_parameters at procmime.c:1756 : #2 procmime_parse_content_disposition at procmime.c:1842 : #3 procmime_parse_mimepart at procmime.c:1967 : #4 procmime_parse_multipart at procmime.c:1566 : #5 procmime_parse_mimepart at procmime.c:1994 : #6 procmime_parse_message_rfc822 at procmime.c:1393 : #7 procmime_scan_file_with_offset at procmime.c:2058 : #8 procmime_scan_file_full at procmime.c:2071 : #9 procmime_scan_file at procmime.c:2078
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Claws-Mail | =3.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4507 is considered a moderate severity vulnerability due to its ability to reliably crash the Claws Mail application.
CVE-2012-4507 affects Claws Mail version 3.8.1, causing it to crash when processing a specific mail in the user mbox file.
To fix CVE-2012-4507, upgrade Claws Mail to a version that addresses this vulnerability.
CVE-2012-4507 specifically affects Claws Mail version 3.8.1.
CVE-2012-4507 requires the targeted email to be present in the user’s mbox file, making it not directly exploitable remotely.