Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.51414
Kategorie:Conectiva Local Security Checks
Titel:Conectiva Security Advisory CLA-2003:630
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing updates announced in
advisory CLA-2003:630.

Balsa is a GNOME email client. It includes code from mutt, wich is a
text-mode email client.

An update[1] for mutt with a fix for a buffer overflow
vulnerability[2] (CVE-2003-0140) in the code that handles IMAP
folders was released in March 14th, 2003.

Balsa 1.2 incorporates the same code from mutt and is vulnerable as
well. An attacker who is able to control an IMAP server accessed by
Balsa can exploit this vulnerability to remotely crash the client or
execute arbitrary code with the privileges of the user running it.
This update fixes this vulnerability.

This announcement also includes a fix for a buffer oveflow
vulnerability found in libesmtp, a library used by Balsa to handle
SMTP conversations. An attacker able to control an SMTP server can
exploit this vulnerability by sending specially crafted responses to
a client that uses libesmtp. These messages can crash the client or
execute arbitrary code in its context.

The Common Vulnerabilities and Exposures (CVE) project has assigned
the name CVE-2002-1090 to this issue[3].


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1090
http://distro2.conectiva.com.br/bugzilla/show_bug.cgi?id=8282
http://distro2.conectiva.com.br/bugzilla/show_bug.cgi?id=8281
http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:630
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003

Risk factor : High

CVSS Score:
7.5

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2003-0140
BugTraq ID: 7120
http://www.securityfocus.com/bid/7120
Bugtraq: 20030319 mutt-1.4.1 fixes a buffer overflow. (Google Search)
http://www.securityfocus.com/archive/1/315679
Bugtraq: 20030320 CORE-20030304-02: Vulnerability in Mutt Mail User Agent (Google Search)
http://marc.info/?l=bugtraq&m=104818814931378&w=2
Bugtraq: 20030320 [OpenPKG-SA-2003.025] OpenPKG Security Advisory (mutt) (Google Search)
http://marc.info/?l=bugtraq&m=104817995421439&w=2
Bugtraq: 20030322 GLSA: mutt (200303-19) (Google Search)
http://marc.info/?l=bugtraq&m=104852190605988&w=2
Bugtraq: 20030430 GLSA: balsa (200304-10) (Google Search)
http://marc.info/?l=bugtraq&m=105171507629573&w=2
Conectiva Linux advisory: CLA-2003:626
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626
Conectiva Linux advisory: CLA-2003:630
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000630
Debian Security Information: DSA-268 (Google Search)
http://www.debian.org/security/2003/dsa-268
http://www.gentoo.org/security/en/glsa/glsa-200303-19.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2003:041
http://www.coresecurity.com/common/showdoc.php?idx=310&idxseccion=10
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A434
http://www.redhat.com/support/errata/RHSA-2003-109.html
SuSE Security Announcement: SuSE-SA:2003:020 (Google Search)
http://www.novell.com/linux/security/advisories/2003_020_mutt.html
XForce ISS Database: mutt-folder-name-bo(11583)
https://exchange.xforce.ibmcloud.com/vulnerabilities/11583
Common Vulnerability Exposure (CVE) ID: CVE-2002-1090
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.