GLSA-200403-06 : Multiple remote buffer overflow vulnerabilities in Courier

high Nessus Plugin ID 14457

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200403-06 (Multiple remote buffer overflow vulnerabilities in Courier)

The vulnerabilities have been found in the 'SHIFT_JIS' converter in 'shiftjis.c' and 'ISO2022JP' converter in 'so2022jp.c'. An attacker may supply Unicode characters that exceed BMP (Basic Multilingual Plane) range, causing an overflow.
Impact :

An attacker without privileges may exploit this vulnerability remotely, allowing arbitrary code to be executed in order to gain unauthorized access.
Workaround :

While a workaround is not currently known for this issue, all users are advised to upgrade to the latest version of the affected packages.

Solution

All users should upgrade to current versions of the affected packages:
# emerge sync # emerge -pv '>=net-mail/courier-imap-3.0.0' # emerge '>=net-mail/courier-imap-3.0.0' # ** Or; depending on your installation... ** # emerge -pv '>=mail-mta/courier-0.45' # emerge '>=mail-mta/courier-0.45'

See Also

https://security.gentoo.org/glsa/200403-06

Plugin Details

Severity: High

ID: 14457

File Name: gentoo_GLSA-200403-06.nasl

Version: 1.14

Type: local

Published: 8/30/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:courier, p-cpe:/a:gentoo:linux:courier-imap, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/26/2004

Reference Information

CVE: CVE-2004-0224

BID: 9845

GLSA: 200403-06