Vulnerabilities > CVE-2005-1522 - Unspecified vulnerability in GNU Mailutils 0.5/0.6
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN gnu
nessus
Summary
The imap4d server for GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows authenticated remote users to cause a denial of service (CPU consumption) via a large range value in the FETCH command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200505-20.NASL description The remote host is affected by the vulnerability described in GLSA-200505-20 (Mailutils: Multiple vulnerabilities in imap4d and mail) infamous41d discovered several vulnerabilities in GNU Mailutils. imap4d does not correctly implement formatted printing of command tags (CAN-2005-1523), fails to validate the range sequence of the last seen 2020-06-01 modified 2020-06-02 plugin id 18384 published 2005-05-28 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18384 title GLSA-200505-20 : Mailutils: Multiple vulnerabilities in imap4d and mail code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 200505-20. # # The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(18384); script_version("1.22"); script_cvs_date("Date: 2019/08/02 13:32:42"); script_cve_id("CVE-2005-1520", "CVE-2005-1521", "CVE-2005-1522", "CVE-2005-1523"); script_xref(name:"GLSA", value:"200505-20"); script_name(english:"GLSA-200505-20 : Mailutils: Multiple vulnerabilities in imap4d and mail"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-200505-20 (Mailutils: Multiple vulnerabilities in imap4d and mail) infamous41d discovered several vulnerabilities in GNU Mailutils. imap4d does not correctly implement formatted printing of command tags (CAN-2005-1523), fails to validate the range sequence of the 'FETCH' command (CAN-2005-1522), and contains an integer overflow in the 'fetch_io' routine (CAN-2005-1521). mail contains a buffer overflow in 'header_get_field_name()' (CAN-2005-1520). Impact : A remote attacker can exploit the format string and integer overflow in imap4d to execute arbitrary code as the imap4d user, which is usually root. By sending a specially crafted email message, a remote attacker could exploit the buffer overflow in the 'mail' utility to execute arbitrary code with the rights of the user running mail. Finally, a remote attacker can also trigger a Denial of Service by sending a malicious FETCH command to an affected imap4d, causing excessive resource consumption. Workaround : There are no known workarounds at this time." ); # http://www.idefense.com/application/poi/display?id=249&type=vulnerabilities script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?25ab4cb8" ); # http://www.idefense.com/application/poi/display?id=248&type=vulnerabilities script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?d6033f90" ); # http://www.idefense.com/application/poi/display?id=247&type=vulnerabilities script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?ceebb2fd" ); # http://www.idefense.com/application/poi/display?id=246&type=vulnerabilities script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?f7b7be14" ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200505-20" ); script_set_attribute( attribute:"solution", value: "All GNU Mailutils users should upgrade to the latest available version: # emerge --sync # emerge --ask --oneshot --verbose '>=net-mail/mailutils-0.6-r1'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:mailutils"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2005/05/27"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/05/28"); script_set_attribute(attribute:"vuln_publication_date", value:"2005/05/25"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"net-mail/mailutils", unaffected:make_list("ge 0.6-r1"), vulnerable:make_list("lt 0.6-r1"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Mailutils"); }
NASL family Gain a shell remotely NASL id GNU_MAILUTILS_060.NASL description GNU Mailutils is a collection of mail utilities, including an IMAP4 daemon, a POP3 daemon, and a very simple mail client. The remote host is running a version of GNU Mailutils containing several critical flaws in its IMAP4 daemon and its mail client last seen 2020-06-01 modified 2020-06-02 plugin id 18371 published 2005-05-26 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18371 title GNU Mailutils <= 0.6 Multiple Vulnerabilities NASL family Debian Local Security Checks NASL id DEBIAN_DSA-732.NASL description 'infamous41md last seen 2020-06-01 modified 2020-06-02 plugin id 18519 published 2005-06-17 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18519 title Debian DSA-732-1 : mailutils - several vulnerabilities
References
- http://secunia.com/advisories/15442
- http://secunia.com/advisories/15442
- http://securitytracker.com/id?1014052
- http://securitytracker.com/id?1014052
- http://www.debian.org/security/2005/dsa-732
- http://www.debian.org/security/2005/dsa-732
- http://www.idefense.com/application/poi/display?id=247&type=vulnerabilities
- http://www.idefense.com/application/poi/display?id=247&type=vulnerabilities
- http://www.securityfocus.com/bid/13765
- http://www.securityfocus.com/bid/13765