Executive Summary

Summary
Title New mailutils packages fix several vulnerabilities
Informations
Name DSA-732 First vendor Publication 2005-06-03
Vendor Debian Last vendor Modification 2005-06-03
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

"infamous41md" discovered several vulnerabilities in the GNU mailutils package which contains utilities for handling mail. These problems can lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities.

CAN-2005-1520

Buffer overflow mail header handling may allow a remote attacker to execute commands with the privileges of the targeted user.

CAN-2005-1521

Combined integer and heap overflow in the fetch routine can lead to the execution of arbitrary code.

CAN-2005-1522

Denial of service in the fetch routine.

CAN-2005-1523

Format string vulnerability can lead to the execution of arbitrary code.

For the stable distribution (woody) these problems have been fixed in version 20020409-1woody2.

For the testing distribution (sarge) these problems have been fixed in version 0.6.1-4.

For the unstable distribution (sid) these problems have been fixed in version 0.6.1-4.

We recommend that you upgrade your mailutils packages.

Original Source

Url : http://www.debian.org/security/2005/dsa-732

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200505-20 (mailutils)
File : nvt/glsa_200505_20.nasl
2008-01-17 Name : Debian Security Advisory DSA 732-1 (mailutils)
File : nvt/deb_732_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
16857 GNU Mailutils imap4d Server Client Command Format String

Mailutils contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when format specifiers are sent as part of user-supplied commands, and are unchecked by the imap4d server. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.
16856 GNU Mailutils imap4d FETCH Command Remote DoS

Mailutils contains a flaw that may allow a remote denial of service. The issue is triggered when a FETCH command with a very large sequence range is sent to the imap4d server, and will result in loss of availability for the platform.
16855 GNU Mailutils imap4d fetch_io Function Remote Overflow

A remote overflow exists in Mailutils. The imap4d server fails to properly validate the fetch_io function resulting in an integer overflow. With a specially crafted END command, an attacker can cause arbitrary code execution resulting in a loss of integrity.
16854 GNU Mailutils Mail header_get_field_name() Function Remote Overflow

A remote overflow exists in Mailutils. The mail program fails to validate a buffer in the header_get_field_name() function resulting in a buffer overflow. With a specially crafted email message, an attacker can cause arbitrary code execution resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 delete literal overflow attempt
RuleID : 3008 - Revision : 13 - Type : PROTOCOL-IMAP
2014-01-10 command overflow attempt
RuleID : 3007-community - Revision : 21 - Type : PROTOCOL-IMAP
2014-01-10 command overflow attempt
RuleID : 3007 - Revision : 21 - Type : PROTOCOL-IMAP
2014-01-10 Multiple IMAP server literal CREATE command buffer overflow attempt
RuleID : 17240 - Revision : 8 - Type : SERVER-MAIL
2014-01-10 Multiple IMAP servers CREATE command buffer overflow attempt
RuleID : 17239 - Revision : 12 - Type : SERVER-MAIL
2014-01-10 CRAM-MD5 authentication method buffer overflow attempt
RuleID : 15484 - Revision : 12 - Type : PROTOCOL-IMAP
2014-01-10 GNU Mailutils request tag format string vulnerability attempt
RuleID : 12392 - Revision : 8 - Type : SERVER-MAIL

Nessus® Vulnerability Scanner

Date Description
2005-06-17 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-732.nasl - Type : ACT_GATHER_INFO
2005-05-28 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200505-20.nasl - Type : ACT_GATHER_INFO
2005-05-26 Name : The remote mail server is affected by multiple issues.
File : gnu_mailutils_060.nasl - Type : ACT_MIXED_ATTACK

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:34:04
  • Multiple Updates