|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2003:274|
The remote host is missing updates announced in
Pine, developed at the University of Washington, is a tool for reading,
sending, and managing electronic messages (including mail and news).
A buffer overflow exists in the way unpatched versions of Pine prior to
4.57 handle the 'message/external-body' type. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0720
to this issue.
An integer overflow exists in the Pine MIME header parsing in versions
prior to 4.57. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2003-0721 to this issue.
Both of these flaws could be exploited by a remote attacker sending a
carefully crafted email to the victim that will execute arbitrary code when
the email is opened using Pine.
All users of Pine are advised to upgrade to these erratum packages, which
contain a backported security patch correcting these issues.
Red Hat would like to thank iDefense for bringing these issues to our
attention and the University of Washington for the patch.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : High
Common Vulnerability Exposure (CVE) ID: CVE-2003-0720|
Bugtraq: 20030910 iDEFENSE Security Advisory 09.10.03: Two Exploitable Overflows in PINE (Google Search)
Bugtraq: 20030911 [slackware-security] security issues in pine (SSA:2003-253-01) (Google Search)
En Garde Linux Advisory: ESA-20030911-022
SuSE Security Announcement: SuSE-SA:2003:037 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2003-0721
Bugtraq: 20030915 remote Pine <= 4.56 exploit fully automatic (Google Search)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.