Executive Summary
Summary | |
---|---|
Title | metamail security update |
Informations | |||
---|---|---|---|
Name | RHSA-2006:0217 | First vendor Publication | 2006-02-21 |
Vendor | RedHat | Last vendor Modification | 2006-02-21 |
Severity (Vendor) | Important | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An updated metamail package that fixes a buffer overflow vulnerability for Red Hat Enterprise Linux 2.1 is now available. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 3. Problem description: Metamail is a system for handling multimedia mail. A buffer overflow bug was found in the way Metamail processes certain mail messages. An attacker could create a carefully-crafted message such that when it is opened by a victim and parsed through Metamail, it runs arbitrary code as the victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2006-0709 to this issue. Users of Metamail should upgrade to this updated package, which contains a backported patch that is not vulnerable to this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 181665 - CVE-2006-0709 Metamail heap based buffer overflow |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2006-0217.html |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200603-16 (metamail) File : nvt/glsa_200603_16.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 995-1 (metamail) File : nvt/deb_995_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
23159 | Metamail Mail Message Boundary Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-995.nasl - Type : ACT_GATHER_INFO |
2006-03-18 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200603-16.nasl - Type : ACT_GATHER_INFO |
2006-02-27 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2006-047.nasl - Type : ACT_GATHER_INFO |
2006-02-22 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0217.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:49:56 |
|