Lucene search

K
osvGoogleOSV:DSA-848-1
HistoryOct 08, 2005 - 12:00 a.m.

masqmail - several

2005-10-0800:00:00
Google
osv.dev
6

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

86.9%

Jens Steube discovered two vulnerabilities in masqmail, a mailer for
hosts without permanent internet connection. The Common
Vulnerabilities and Exposures project identifies the following
problems:

  • CAN-2005-2662
    When sending failed mail messages, the address is not sanitised,
    which allows a local attacker to execute arbitrary commands as the
    mail user.
  • CAN-2005-2663
    When opening the log file, masqmail does not relinquish
    privileges, which allows a local attacker to overwrite arbitrary
    files via a symlink attack.

For the old stable distribution (woody) these problems have been fixed in
version 0.1.16-2.2.

For the stable distribution (sarge) these problems have been fixed in
version 0.2.20-1sarge1.

For the unstable distribution (sid) these problems have been fixed in
version 0.2.20-1sarge1.

We recommend that you upgrade your masqmail package.

CPENameOperatorVersion
masqmaileq0.2.20-1

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

86.9%