Debian DSA-671-1 : xemacs21 - format string

high Nessus Plugin ID 16345

Synopsis

The remote Debian host is missing a security-related update.

Description

Max Vozeler discovered several format string vulnerabilities in the movemail utility of Emacs, the well-known editor. Via connecting to a malicious POP server an attacker can execute arbitrary code under the privileges of group mail.

Solution

Upgrade the emacs packages.

For the stable distribution (woody) these problems have been fixed in version 21.4.6-8woody2.

See Also

http://www.debian.org/security/2005/dsa-671

Plugin Details

Severity: High

ID: 16345

File Name: debian_DSA-671.nasl

Version: 1.19

Type: local

Agent: unix

Published: 2/10/2005

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:xemacs21, cpe:/o:debian:debian_linux:3.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 2/8/2005

Vulnerability Publication Date: 2/7/2005

Reference Information

CVE: CVE-2005-0100

DSA: 671