Summary
The host has Alpine installed and is prone to Buffer Overflow Vulnerabilities.
Impact
Successful exploitation allows execution of arbitrary code, but requires that the utilities are configured as a delivery backend for a mail transfer agent allowing overly long destination mailbox names.
Impact Level: Application
Solution
Update to higher Version or Apply patches from,
http://www.washington.edu/alpine/tmailbug.html
*****
NOTE : Ignore this warning, if above mentioned patch is applied already.
*****
Insight
The flaws are due to boundary error in the tmail/dmail utility, when processing overly long mailbox names composed of a username and + character followed by a long string and also by specifying a long folder extension argument on the command line.
Affected
University of Washington Alpine 2.00 and priror on Windows.
References
Severity
Classification
-
CVE CVE-2008-5005 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities