English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 74154 CVE descriptions
and 39337 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51417
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2003:635
Summary:Conectiva Security Advisory CLA-2003:635
Description:
The remote host is missing updates announced in
advisory CLA-2003:635.

Balsa is a GNOME email client. It includes code from mutt, wich is a
text-mode email client.

An update[1] for mutt with a fix for a buffer overflow
vulnerability[2] (CVE-2003-0140) in the code that handles IMAP
folders was released in March 14th, 2003.

The mutt version distributed with Conectiva Linux 9
(mutt-1.5.4-28732cl) is not vulnerable to this issue, but balsa
versions <= 1.2 incorporate the same code from the old mutt, thus
being also vulnerable (Conectiva Linux 9 includes the package
balsa-2.0.9-29085cl).

An attacker who is able to control an IMAP server accessed by balsa
can exploit this vulnerability to remotely crash the client or
execute arbitrary code with the privileges of the user running it.
This update fixes this vulnerability.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626&idioma=en
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0140
http://distro2.conectiva.com.br/bugzilla/show_bug.cgi?id=8282
http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:635
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003

Risk factor : High
Cross-Ref: BugTraq ID: 7120
Common Vulnerability Exposure (CVE) ID: CVE-2003-0140
Bugtraq: 20030320 CORE-20030304-02: Vulnerability in Mutt Mail User Agent (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=104818814931378&w=2
http://www.coresecurity.com/common/showdoc.php?idx=310&idxseccion=10
Debian Security Information: DSA-268 (Google Search)
http://www.debian.org/security/2003/dsa-268
http://www.gentoo.org/security/en/glsa/glsa-200303-19.xml
SuSE Security Announcement: SuSE-SA:2003:020 (Google Search)
http://www.novell.com/linux/security/advisories/2003_020_mutt.html
http://www.mandriva.com/security/advisories?name=MDKSA-2003:041
http://www.redhat.com/support/errata/RHSA-2003-109.html
Conectiva Linux advisory: CLA-2003:626
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626
Conectiva Linux advisory: CLA-2003:630
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000630
Bugtraq: 20030319 mutt-1.4.1 fixes a buffer overflow. (Google Search)
http://www.securityfocus.com/archive/1/315679
Bugtraq: 20030320 [OpenPKG-SA-2003.025] OpenPKG Security Advisory (mutt) (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=104817995421439&w=2
Bugtraq: 20030322 GLSA: mutt (200303-19) (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=104852190605988&w=2
Bugtraq: 20030430 GLSA: balsa (200304-10) (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=105171507629573&w=2
XForce ISS Database: mutt-folder-name-bo(11583)
http://xforce.iss.net/xforce/xfdb/11583
http://www.securityfocus.com/bid/7120
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:2
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:434
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 39337 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.