Vulnerabilities > CVE-2002-1279 - Unspecified vulnerability in Masqmail 0.1.16
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN masqmail
nessus
Summary
Multiple buffer overflows in conf.c for Masqmail 0.1.x before 0.1.17, and 0.2.x before 0.2.15, allow local users to gain privileges via certain entries in the configuration file (-C option).
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-194.NASL |
description | A set of buffer overflows have been discovered in masqmail, a mail transport agent for hosts without permanent internet connection. In addition to this privileges were dropped only after reading a user-supplied configuration file. Together this could be exploited to gain unauthorized root access to the machine on which masqmail is installed. These problems have been fixed in version 0.1.16-2.1 for the current stable distribution (woody) and in version 0.2.15-1 for the unstable distribution (sid). The old stable distribution (potato) is not affected since it doesn |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15031 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15031 |
title | Debian DSA-194-1 : masqmail - buffer overflows |
code |
|
References
- http://lists.masqmail.cx/pipermail/masqmail/2002-November/000040.html
- http://lists.masqmail.cx/pipermail/masqmail/2002-November/000040.html
- http://lists.masqmail.cx/pipermail/masqmail/2002-November/000041.html
- http://lists.masqmail.cx/pipermail/masqmail/2002-November/000041.html
- http://www.debian.org/security/2002/dsa-194
- http://www.debian.org/security/2002/dsa-194
- http://www.iss.net/security_center/static/10605.php
- http://www.iss.net/security_center/static/10605.php
- http://www.securityfocus.com/bid/6164
- http://www.securityfocus.com/bid/6164