Summary
The remote host is missing an update to emil
announced via advisory DSA 468-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20468-1
Insight
Ulf Harnhammar discovered a number of vulnerabilities in emil, a filter for converting Internet mail messages. The vulnerabilities fall into two categories:
- CVE-2004-0152 - Buffer overflows in (1) the encode_mime function, (2) the encode_uuencode function, (3) the decode_uuencode function. These bugs could allow a carefully crafted email message to cause the execution of arbitrary code supplied with the message when it is acted upon by emil.
- CVE-2004-0153 - Format string bugs in statements which print various error messages. The exploit potential of these bugs has not been established, and is probably configuration-dependent.
For the stable distribution (woody) these problems have been fixed in version 2.1.0-beta9-11woody1.
For the unstable distribution (sid) these problems will be fixed soon.
We recommend that you update your emil package.
Severity
Classification
-
CVE CVE-2004-0152, CVE-2004-0153 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities