Lucene search

K
gentooGentoo FoundationGLSA-200611-15
HistoryNov 21, 2006 - 12:00 a.m.

qmailAdmin: Buffer overflow

2006-11-2100:00:00
Gentoo Foundation
security.gentoo.org
12

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.161

Percentile

96.0%

Background

qmailAdmin is a free software package that provides a web interface for managing a qmail system with virtual domains.

Description

qmailAdmin fails to properly handle the “PATH_INFO” variable in qmailadmin.c. The PATH_INFO is a standard CGI environment variable filled with user supplied data.

Impact

A remote attacker could exploit this vulnerability by sending qmailAdmin a maliciously crafted URL that could lead to the execution of arbitrary code with the permissions of the user running qmailAdmin.

Workaround

There is no known workaround at this time.

Resolution

All qmailAdmin users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-mail/qmailadmin-1.2.10"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-mail/qmailadmin< 1.2.10UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.161

Percentile

96.0%

Related for GLSA-200611-15