Lucene search

K
gentooGentoo FoundationGLSA-200508-03
HistoryAug 02, 2005 - 12:00 a.m.

nbSMTP: Format string vulnerability

2005-08-0200:00:00
Gentoo Foundation
security.gentoo.org
12

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.133 Low

EPSS

Percentile

95.6%

Background

nbSMTP is an SMTP client suitable to run in chroot jails, in embedded systems, laptops and workstations.

Description

Niels Heinen discovered a format string vulnerability.

Impact

An attacker can setup a malicious SMTP server and exploit this vulnerability to execute arbitrary code with the permissions of the user running nbSMTP.

Workaround

There is no known workaround at this time.

Resolution

All nbSMTP users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=mail-mta/nbsmtp-1.0"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmail-mta/nbsmtp< 1.00UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.133 Low

EPSS

Percentile

95.6%

Related for GLSA-200508-03