Lucene search

K
gentooGentoo FoundationGLSA-200405-17
HistoryMay 21, 2004 - 12:00 a.m.

Multiple vulnerabilities in metamail

2004-05-2100:00:00
Gentoo Foundation
security.gentoo.org
9

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.926 High

EPSS

Percentile

99.0%

Background

Metamail is a program that decodes MIME encoded mail. It is therefore often automatically called when an email is received or read.

Description

Ulf Harnhammar found two format string bugs and two buffer overflow bugs in Metamail.

Impact

A remote attacker could send a malicious email message and execute arbitrary code with the rights of the process calling the Metamail program.

Workaround

There is no known workaround at this time.

Resolution

All users of Metamail should upgrade to the latest stable version:

 # emerge sync

 # emerge -pv ">=net-mail/metamail-2.7.45.3"
 # emerge ">=net-mail/metamail-2.7.45.3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-mail/metamail< 2.7.45.3UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.926 High

EPSS

Percentile

99.0%