Summary
The remote host is missing an update to log2mail
announced via advisory DSA 186-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20186-1
Insight
Enrico Zini discovered a buffer overflow in log2mail, a daemon for watching logfiles and sending lines with matching patterns via mail.
The log2mail daemon is started upon system boot and runs as root. A specially crafted (remote) log message could overflow a static buffer, potentially leaving log2mail to execute arbitrary code as root.
This problem has been fixed in version 0.2.5.1 the current stable distribution (woody) and in version for the unstable distribution (sid). The old stable distribution (potato) is not affected since it doesn't contain a log2mail package
We recommend that you upgrade your log2mail package.
Severity
Classification
-
CVE CVE-2002-1251 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities