Vulnerabilities > CVE-2003-0721 - Improper Validation of Array Index vulnerability in Washington Pine

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Integer signedness error in rfc2231_get_param from strings.c in PINE before 4.58 allows remote attackers to execute arbitrary code via an email that causes an out-of-bounds array access using a negative number.

Vulnerable Configurations

Part Description Count
Application
Washington
91

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.

Nessus

  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_39BD57E65D8311D880E30020ED76EF5A.NASL
    descriptionPine versions prior to 4.58 are affected by two vulnerabilities discovered by iDEFENSE, a buffer overflow in mailview.c and an integer overflow in strings.c. Both vulnerabilities can result in arbitrary code execution when processing a malicious message.
    last seen2020-06-01
    modified2020-06-02
    plugin id37712
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/37712
    titleFreeBSD : pine remotely exploitable vulnerabilities (39bd57e6-5d83-11d8-80e3-0020ed76ef5a)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2003-274.NASL
    descriptionUpdated Pine packages that resolve remotely exploitable security issues are now available. Pine, developed at the University of Washington, is a tool for reading, sending, and managing electronic messages (including mail and news). A buffer overflow exists in the way unpatched versions of Pine prior to 4.57 handle the
    last seen2020-06-01
    modified2020-06-02
    plugin id12420
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/12420
    titleRHEL 2.1 : pine (RHSA-2003:274)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PINE_458.NASL
    descriptionThe following package needs to be updated: iw-pine
    last seen2016-09-26
    modified2004-07-06
    plugin id12602
    published2004-07-06
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=12602
    titleFreeBSD : pine remotely exploitable vulnerabilities (151)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SA_2003_037.NASL
    descriptionThe remote host is missing the patch for the advisory SUSE-SA:2003:037 (pine). The well known and widely used mail client pine is vulnerable to a buffer overflow. The vulnerability exists in the code processing
    last seen2020-06-01
    modified2020-06-02
    plugin id13805
    published2004-07-25
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/13805
    titleSUSE-SA:2003:037: pine

Oval

accepted2007-04-25T19:52:33.657-04:00
classvulnerability
contributors
  • nameJay Beale
    organizationBastille Linux
  • nameJay Beale
    organizationBastille Linux
  • nameThomas R. Jones
    organizationMaitreya Security
descriptionInteger signedness error in rfc2231_get_param from strings.c in PINE before 4.58 allows remote attackers to execute arbitrary code via an email that causes an out-of-bounds array access using a negative number.
familyunix
idoval:org.mitre.oval:def:503
statusaccepted
submitted2003-09-12T12:00:00.000-04:00
titleInteger Signedness Error in PINE
version36

Redhat

advisories
  • rhsa
    idRHSA-2003:273
  • rhsa
    idRHSA-2003:274