Balsa: Buffer overflow
Gentoo Linux Security Advisory
||GLSA 200710-17 / balsa
||October 16, 2007
||October 16, 2007: 01
All supported architectures
Balsa is vulnerable to a buffer overflow allowing for the user-assisted
execution of arbitrary code.
Balsa is a highly configurable email client for GNOME.
Evil Ninja Squirrel discovered a stack-based buffer overflow in the
ir_fetch_seq() function when receiving a long response to a FETCH
A remote attacker could entice a user to connect to a malicious or
compromised IMAP server, possibly leading to the execution of arbitrary
code with the rights of the user running Balsa.
There is no known workaround at this time.
All Balsa users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/balsa-2.3.20"