Vulnerabilities > CVE-2005-1824 - Unspecified vulnerability in GNU Mailutils 1.0.6.1.1

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
gnu
nessus

Summary

The sql_escape_string function in auth/sql.c for the mailutils SQL authentication module does not properly quote the "\" (backslash) character, which is used as an escape character and makes the module vulnerable to SQL injection attacks.

Vulnerable Configurations

Part Description Count
Application
Gnu
1

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200506-02.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200506-02 (Mailutils: SQL Injection) When GNU Mailutils is built with the
    last seen2020-06-01
    modified2020-06-02
    plugin id18425
    published2005-06-07
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/18425
    titleGLSA-200506-02 : Mailutils: SQL Injection
  • NASL familyGain a shell remotely
    NASL idGNU_MAILUTILS_060.NASL
    descriptionGNU Mailutils is a collection of mail utilities, including an IMAP4 daemon, a POP3 daemon, and a very simple mail client. The remote host is running a version of GNU Mailutils containing several critical flaws in its IMAP4 daemon and its mail client
    last seen2020-06-01
    modified2020-06-02
    plugin id18371
    published2005-05-26
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/18371
    titleGNU Mailutils <= 0.6 Multiple Vulnerabilities