RHEL 2.1 : metamail (RHSA-2006:0217)

high Nessus Plugin ID 20966

Synopsis

The remote Red Hat host is missing a security update.

Description

An updated metamail package that fixes a buffer overflow vulnerability for Red Hat Enterprise Linux 2.1 is now available.

This update has been rated as having important security impact by the Red Hat Security Response Team.

Metamail is a system for handling multimedia mail.

A buffer overflow bug was found in the way Metamail processes certain mail messages. An attacker could create a carefully-crafted message such that when it is opened by a victim and parsed through Metamail, it runs arbitrary code as the victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2006-0709 to this issue.

Users of Metamail should upgrade to this updated package, which contains a backported patch that is not vulnerable to this issue.

Solution

Update the affected metamail package.

See Also

https://access.redhat.com/security/cve/cve-2006-0709

https://access.redhat.com/errata/RHSA-2006:0217

Plugin Details

Severity: High

ID: 20966

File Name: redhat-RHSA-2006-0217.nasl

Version: 1.24

Type: local

Agent: unix

Published: 2/22/2006

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:2.1, p-cpe:/a:redhat:enterprise_linux:metamail

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 2/21/2006

Vulnerability Publication Date: 2/15/2006

Reference Information

CVE: CVE-2006-0709

BID: 16611

RHSA: 2006:0217