Executive Summary
Summary | |
---|---|
Title | New mailutils packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-732 | First vendor Publication | 2005-06-03 |
Vendor | Debian | Last vendor Modification | 2005-06-03 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
"infamous41md" discovered several vulnerabilities in the GNU mailutils package which contains utilities for handling mail. These problems can lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities. CAN-2005-1520 Buffer overflow mail header handling may allow a remote attacker to execute commands with the privileges of the targeted user. CAN-2005-1521 Combined integer and heap overflow in the fetch routine can lead to the execution of arbitrary code. CAN-2005-1522 Denial of service in the fetch routine. CAN-2005-1523 Format string vulnerability can lead to the execution of arbitrary code. For the stable distribution (woody) these problems have been fixed in version 20020409-1woody2. For the testing distribution (sarge) these problems have been fixed in version 0.6.1-4. For the unstable distribution (sid) these problems have been fixed in version 0.6.1-4. We recommend that you upgrade your mailutils packages. |
Original Source
Url : http://www.debian.org/security/2005/dsa-732 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200505-20 (mailutils) File : nvt/glsa_200505_20.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 732-1 (mailutils) File : nvt/deb_732_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
16857 | GNU Mailutils imap4d Server Client Command Format String Mailutils contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when format specifiers are sent as part of user-supplied commands, and are unchecked by the imap4d server. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity. |
16856 | GNU Mailutils imap4d FETCH Command Remote DoS Mailutils contains a flaw that may allow a remote denial of service. The issue is triggered when a FETCH command with a very large sequence range is sent to the imap4d server, and will result in loss of availability for the platform. |
16855 | GNU Mailutils imap4d fetch_io Function Remote Overflow A remote overflow exists in Mailutils. The imap4d server fails to properly validate the fetch_io function resulting in an integer overflow. With a specially crafted END command, an attacker can cause arbitrary code execution resulting in a loss of integrity. |
16854 | GNU Mailutils Mail header_get_field_name() Function Remote Overflow A remote overflow exists in Mailutils. The mail program fails to validate a buffer in the header_get_field_name() function resulting in a buffer overflow. With a specially crafted email message, an attacker can cause arbitrary code execution resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | delete literal overflow attempt RuleID : 3008 - Revision : 13 - Type : PROTOCOL-IMAP |
2014-01-10 | command overflow attempt RuleID : 3007-community - Revision : 21 - Type : PROTOCOL-IMAP |
2014-01-10 | command overflow attempt RuleID : 3007 - Revision : 21 - Type : PROTOCOL-IMAP |
2014-01-10 | Multiple IMAP server literal CREATE command buffer overflow attempt RuleID : 17240 - Revision : 8 - Type : SERVER-MAIL |
2014-01-10 | Multiple IMAP servers CREATE command buffer overflow attempt RuleID : 17239 - Revision : 12 - Type : SERVER-MAIL |
2014-01-10 | CRAM-MD5 authentication method buffer overflow attempt RuleID : 15484 - Revision : 12 - Type : PROTOCOL-IMAP |
2014-01-10 | GNU Mailutils request tag format string vulnerability attempt RuleID : 12392 - Revision : 8 - Type : SERVER-MAIL |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-06-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-732.nasl - Type : ACT_GATHER_INFO |
2005-05-28 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200505-20.nasl - Type : ACT_GATHER_INFO |
2005-05-26 | Name : The remote mail server is affected by multiple issues. File : gnu_mailutils_060.nasl - Type : ACT_MIXED_ATTACK |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:04 |
|