Debian DSA-449-1 addresses buffer overflow and format string bugs in metamail, requiring upgrade.
Reporter | Title | Published | Views | Family All 39 |
---|---|---|---|---|
![]() | metamail security update | 18 Feb 200404:38 | – | slackware |
![]() | [SECURITY] [DSA 449-1] New metamail packages fix arbitrary code execution | 24 Feb 200411:29 | – | debian |
![]() | [SECURITY] [DSA 449-1] New metamail packages fix arbitrary code execution | 24 Feb 200411:29 | – | debian |
![]() | Mandrake Linux Security Advisory : metamail (MDKSA-2004:014) | 31 Jul 200400:00 | – | nessus |
![]() | Slackware 8.1 / 9.0 / 9.1 / current : metamail security update (SSA:2004-049-02) | 13 Jul 200500:00 | – | nessus |
![]() | FreeBSD : metamail format string bugs and buffer overflows (108) | 6 Jul 200400:00 | – | nessus |
![]() | GLSA-200405-17 : Multiple vulnerabilities in metamail | 30 Aug 200400:00 | – | nessus |
![]() | RHEL 2.1 : metamail (RHSA-2004:073) | 6 Jul 200400:00 | – | nessus |
![]() | FreeBSD : metamail format string bugs and buffer overflows (a20082c3-6255-11d8-80e3-0020ed76ef5a) | 23 Apr 200900:00 | – | nessus |
![]() | Slackware: Security Advisory (SSA:2004-049-02) | 10 Sep 201200:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-449. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(15286);
script_version("1.26");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_cve_id("CVE-2004-0104", "CVE-2004-0105");
script_bugtraq_id(9692);
script_xref(name:"CERT", value:"513062");
script_xref(name:"CERT", value:"518518");
script_xref(name:"DSA", value:"449");
script_name(english:"Debian DSA-449-1 : metamail - buffer overflow, format string bugs");
script_summary(english:"Checks dpkg output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"Ulf Harnhammar discovered two format string bugs ( CAN-2004-0104) and
two buffer overflow bugs ( CAN-2004-0105) in metamail, an
implementation of MIME. An attacker could create a carefully-crafted
mail message which will execute arbitrary code as the victim when it
is opened and parsed through metamail.
We have been devoting some effort to trying to avoid shipping metamail
in the future. It became unmaintainable and these are probably not the
last of the vulnerabilities."
);
script_set_attribute(
attribute:"see_also",
value:"http://www.debian.org/security/2004/dsa-449"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade the metamail package.
For the stable distribution (woody) these problems have been fixed in
version 2.7-45woody.2."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:metamail");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0");
script_set_attribute(attribute:"patch_publication_date", value:"2004/02/24");
script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"3.0", prefix:"metamail", reference:"2.7-45woody.2")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo