Claws Mail: Insecure temporary file creation — GLSA 200801-03

Claws Mail uses temporary files in an insecure manner, allowing for a symlink attack.

Affected packages

mail-client/claws-mail on all architectures
Affected versions < 3.0.2-r1
Unaffected versions >= 3.0.2-r1

Background

Claws Mail is a GTK based e-mail client.

Description

Nico Golde from Debian reported that the sylprint.pl script that is part of the Claws Mail tools creates temporary files in an insecure manner.

Impact

A local attacker could exploit this vulnerability to conduct symlink attacks to overwrite files with the privileges of the user running Claws Mail.

Workaround

There is no known workaround at this time.

Resolution

All Claws Mail users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=mail-client/claws-mail-3.0.2-r1"

References

Release date
January 09, 2008

Latest revision
January 09, 2008: 01

Severity
normal

Exploitable
local

Bugzilla entries