Lucene search

K
gentooGentoo FoundationGLSA-200506-02
HistoryJun 06, 2005 - 12:00 a.m.

Mailutils: SQL Injection

2005-06-0600:00:00
Gentoo Foundation
security.gentoo.org
7

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

54.2%

Background

GNU Mailutils is a collection of mail-related utilities.

Description

When GNU Mailutils is built with the “mysql” or “postgres” USE flag, the sql_escape_string function of the authentication module fails to properly escape the "" character, rendering it vulnerable to a SQL command injection.

Impact

A malicious remote user could exploit this vulnerability to inject SQL commands to the underlying database.

Workaround

There is no known workaround at this time.

Resolution

All GNU Mailutils users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-mail/mailutils-0.6-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-mail/mailutils< 0.6-r1UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

54.2%

Related for GLSA-200506-02