CVE-2013-4478

NameCVE-2013-4478
DescriptionSup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename of an email attachment.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2805-1
Debian Bugs728232

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sup-mail (PTS)buster0.22.1-2fixed
bullseye1.0-3fixed
sid, trixie, bookworm1.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sup-mailsourcesqueeze0.11-2+nmu1+deb6u1DSA-2805-1
sup-mailsourcewheezy0.12.1+git20120407.aaa852f-1+deb7u1DSA-2805-1
sup-mailsource(unstable)0.12.1+git20120407.aaa852f-1+deb7u1728232

Notes

http://rubyforge.org/pipermail/sup-talk/2013-October/004996.html
https://github.com/sup-heliotrope/sup/commit/8b46cdbfc14e07ca07d403aa28b0e7bc1c544785

Search for package or bug name: Reporting problems