English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 73247 CVE descriptions
and 39212 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51414
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2003:630
Summary:Conectiva Security Advisory CLA-2003:630
Description:
The remote host is missing updates announced in
advisory CLA-2003:630.

Balsa is a GNOME email client. It includes code from mutt, wich is a
text-mode email client.

An update[1] for mutt with a fix for a buffer overflow
vulnerability[2] (CVE-2003-0140) in the code that handles IMAP
folders was released in March 14th, 2003.

Balsa 1.2 incorporates the same code from mutt and is vulnerable as
well. An attacker who is able to control an IMAP server accessed by
Balsa can exploit this vulnerability to remotely crash the client or
execute arbitrary code with the privileges of the user running it.
This update fixes this vulnerability.

This announcement also includes a fix for a buffer oveflow
vulnerability found in libesmtp, a library used by Balsa to handle
SMTP conversations. An attacker able to control an SMTP server can
exploit this vulnerability by sending specially crafted responses to
a client that uses libesmtp. These messages can crash the client or
execute arbitrary code in its context.

The Common Vulnerabilities and Exposures (CVE) project has assigned
the name CVE-2002-1090 to this issue[3].


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1090
http://distro2.conectiva.com.br/bugzilla/show_bug.cgi?id=8282
http://distro2.conectiva.com.br/bugzilla/show_bug.cgi?id=8281
http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:630
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003

Risk factor : High
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0140
Bugtraq: 20030320 CORE-20030304-02: Vulnerability in Mutt Mail User Agent (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=104818814931378&w=2
http://www.coresecurity.com/common/showdoc.php?idx=310&idxseccion=10
Debian Security Information: DSA-268 (Google Search)
http://www.debian.org/security/2003/dsa-268
http://www.gentoo.org/security/en/glsa/glsa-200303-19.xml
SuSE Security Announcement: SuSE-SA:2003:020 (Google Search)
http://www.novell.com/linux/security/advisories/2003_020_mutt.html
http://www.mandriva.com/security/advisories?name=MDKSA-2003:041
http://www.redhat.com/support/errata/RHSA-2003-109.html
Conectiva Linux advisory: CLA-2003:626
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626
Conectiva Linux advisory: CLA-2003:630
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000630
Bugtraq: 20030319 mutt-1.4.1 fixes a buffer overflow. (Google Search)
http://www.securityfocus.com/archive/1/315679
Bugtraq: 20030320 [OpenPKG-SA-2003.025] OpenPKG Security Advisory (mutt) (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=104817995421439&w=2
Bugtraq: 20030322 GLSA: mutt (200303-19) (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=104852190605988&w=2
Bugtraq: 20030430 GLSA: balsa (200304-10) (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=105171507629573&w=2
XForce ISS Database: mutt-folder-name-bo(11583)
http://xforce.iss.net/xforce/xfdb/11583
BugTraq ID: 7120
http://www.securityfocus.com/bid/7120
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:2
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:434
Common Vulnerability Exposure (CVE) ID: CVE-2002-1090
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 39212 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.