Debian Security Advisory DSA 468-1 (emil)

Summary
The remote host is missing an update to emil announced via advisory DSA 468-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20468-1
Insight
Ulf Harnhammar discovered a number of vulnerabilities in emil, a filter for converting Internet mail messages. The vulnerabilities fall into two categories: - CVE-2004-0152 - Buffer overflows in (1) the encode_mime function, (2) the encode_uuencode function, (3) the decode_uuencode function. These bugs could allow a carefully crafted email message to cause the execution of arbitrary code supplied with the message when it is acted upon by emil. - CVE-2004-0153 - Format string bugs in statements which print various error messages. The exploit potential of these bugs has not been established, and is probably configuration-dependent. For the stable distribution (woody) these problems have been fixed in version 2.1.0-beta9-11woody1. For the unstable distribution (sid) these problems will be fixed soon. We recommend that you update your emil package.