Hi all,

> A security bug has been discovered in PHPMailer:
> | PHPMailer 1.7, when configured to use sendmail, allows remote
> | attackers to execute arbitrary shell commands via shell metacharacters
> | in the SendmailSend function in class.phpmailer.php
>
> <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3215>
> <https://sourceforge.net/tracker/index.php?func=detail&aid=1734811&group_id
>=26031&atid=385707>
>
> Your package contains a copy of PHPMailer.

I've fixed this for unstable since replacing the copy of phpmailer with a 
dependency was a good move anyway. For stable I've checked whether it's 
vulnerable and I believe it's not: the vulnerability is in the SendmailSend() 
function. That requires for the calling code to actually use the sendmail 
method, which Flyspray does not allow in any configuration.

I suppose the security team does not send advisories for insecure code that is 
not called?

As an additional note: sarge is not vulnerable because it doesn't contain a 
copy of the phpmailer class at all.


Thijs


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to