Lucene search

K

Gentoo Security Advisory GLSA 200409-01 (vpopmail)

๐Ÿ—“๏ธย 24 Sep 2008ย 00:00:00Reported byย Copyright (C) 2008 E-Soft Inc.Typeย 
openvas
ย openvas
๐Ÿ”—ย plugins.openvas.org๐Ÿ‘ย 2ย Views

Gentoo Security Advisory GLSA 200409-01 (vpopmail) contains multiple vulnerabilities including SQL injection, buffer overflow, and format string exploit, leading to arbitrary code execution. Upgrade to net-mail/vpopmail-5.4.

Show more
Refs
Code
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.54658");
  script_version("2023-07-18T05:05:36+0000");
  script_tag(name:"last_modification", value:"2023-07-18 05:05:36 +0000 (Tue, 18 Jul 2023)");
  script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_name("Gentoo Security Advisory GLSA 200409-01 (vpopmail)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 E-Soft Inc.");
  script_family("Gentoo Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/gentoo", "ssh/login/pkg");
  script_tag(name:"insight", value:"vpopmail contains several bugs making it vulnerable to several SQL
injection exploits as well as one buffer overflow and one format string
exploit when using Sybase. This could lead to the execution of arbitrary
code.");
  script_tag(name:"solution", value:"All vpopmail users should upgrade to the latest version:

    # emerge sync

    # emerge -pv '>=net-mail/vpopmail-5.4.6'
    # emerge '>=net-mail/vpopmail-5.4.6'");

  script_xref(name:"URL", value:"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200409-01");
  script_xref(name:"URL", value:"http://bugs.gentoo.org/show_bug.cgi?id=60844");
  script_xref(name:"URL", value:"http://sourceforge.net/forum/forum.php?forum_id=400873");
  script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/371913/2004-08-15/2004-08-21/0");
  script_tag(name:"summary", value:"The remote host is missing updates announced in
advisory GLSA 200409-01.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("pkg-lib-gentoo.inc");
include("revisions-lib.inc");

res = "";
report = "";
report = "";
if ((res = ispkgvuln(pkg:"net-mail/vpopmail", unaffected: make_list("ge 5.4.6"), vulnerable: make_list("lt 5.4.6"))) != NULL) {
    report += res;
}

if (report != "") {
    security_message(data:report);
} else if (__pkg_match) {
    exit(99);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo