[3.3] newsbeuter: remote code execution (CVE-2017-14500)
Improper Neutralization of Special Elements used in an OS Command in the
podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9
allows remote
attackers to perform user-assisted code execution by crafting an RSS
item with a media enclosure (i.e., a podcast file) that includes shell
metacharacters in its filename,
related to pb_controller.cpp and queueloader.cpp, a different
vulnerability than CVE-2017-12904.
References:
https://github.com/akrennmair/newsbeuter/issues/598
http://openwall.com/lists/oss-security/2017/09/16/1
(from redmine: issue id 7880, created on 2017-09-21, closed on 2017-10-25)
- Relations:
- parent #7875 (closed)
- Changesets:
- Revision ba1d5a94 on 2017-10-24T14:54:40Z:
main/newsbeuter: security fix (CVE-2017-14500)
fixes #7880