CVE-2002-1075
CVSS7.5
发布时间 :2002-10-04 00:00:00
修订时间 :2008-09-05 16:29:42
NMCOES    

[原文]Buffer overflow in Pegasus mail client 4.01 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) To or (2) From headers.


[CNNVD]Pegasus Mail信息头远程缓冲区溢出漏洞(CNNVD-200210-089)

        
        Pegasus Mail是一款电子邮件客户端,可使用在Microsoft Windows操作系统下。
        Pegasus Mail在处理邮件部分信息字段时没有正确检查缓冲区边界,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击。
        Pegasus mail在没有正确处理邮件中的"From:"和"To:"字段数据,攻击者可以编辑在信息头"From:"和"To:"字段包含超过259字符的邮件,发送给Pegasus mail处理,可导致Pegasus mail崩溃,精心构建"From:"和"To:"字段数据可能使攻击者以Pegasus Mail进程的权限在系统中执行任意指令。
        Pegasus Mail 4.01重现了此漏洞,其他早期版本也可能存在这个漏洞。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1075
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1075
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-089
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5302
(VENDOR_ADVISORY)  BID  5302
http://www.iss.net/security_center/static/9673.php
(VENDOR_ADVISORY)  XF  pegasus-message-header-bo(9673)
http://archives.neohapsis.com/archives/bugtraq/2002-07/0277.html
(UNKNOWN)  BUGTRAQ  20020724 Pegasus mail DoS

- 漏洞信息

Pegasus Mail信息头远程缓冲区溢出漏洞
高危 边界条件错误
2002-10-04 00:00:00 2005-10-20 00:00:00
远程  
        
        Pegasus Mail是一款电子邮件客户端,可使用在Microsoft Windows操作系统下。
        Pegasus Mail在处理邮件部分信息字段时没有正确检查缓冲区边界,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击。
        Pegasus mail在没有正确处理邮件中的"From:"和"To:"字段数据,攻击者可以编辑在信息头"From:"和"To:"字段包含超过259字符的邮件,发送给Pegasus mail处理,可导致Pegasus mail崩溃,精心构建"From:"和"To:"字段数据可能使攻击者以Pegasus Mail进程的权限在系统中执行任意指令。
        Pegasus Mail 4.01重现了此漏洞,其他早期版本也可能存在这个漏洞。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * Auriemma Luigi (bugtest_at_sitoverde.com)提供了如下第三方补丁:
        
        http://archives.neohapsis.com/archives/bugtraq/2002-07/att-0277/01-pegasus.zip

        厂商补丁:
        David Harris
        ------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.pmail.com/

- 漏洞信息 (21648)

Pegasus Mail 4.0 1 Message Header Buffer Overflow Vulnerability (EDBID:21648)
windows remote
2002-07-24 Verified
0 Auriemma Luigi
N/A [点击下载]
source: http://www.securityfocus.com/bid/5302/info

Pegasus Mail is an email client for Microsoft Windows and DOS based systems. A buffer overflow vulnerability has been reported in some versions of Pegasus Mail.

Reportedly, Pegasus is vulnerable to a buffer overflow condition when processing some long message headers. If either the 'To:' or 'From:' message headers are longer than approximately 259 characters, Pegasus may crash when displaying the message.

This issue has been reported in Pegasus Mail 4.01. Earlier versions may share this vulnerability, this has not however been confirmed.

http://www.exploit-db.com/sploits/21648.zip		

- 漏洞信息

6481
Pegasus Mail From/To Header Overflow DoS
Context Dependent Denial of Service, Input Manipulation
Loss of Availability
Exploit Public

- 漏洞描述

An overflow exists in the Pegasus mail client. The MUA fails to process long headers over 259 characters in the To: or From: fields resulting in a buffer overflow. With a specially crafted request, an attacker can cause a crash or possibly execute code resulting in a loss of integrity and/or availability.

- 时间线

2002-07-24 Unknow
2002-07-24 Unknow

- 解决方案

Upgrade to version Pegasus Mail 4.02 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Pegasus Mail Message Header Buffer Overflow Vulnerability
Boundary Condition Error 5302
Yes No
2002-07-24 12:00:00 2009-07-11 02:56:00
Discovered by Auriemma Luigi <bugtest@sitoverde.com>.

- 受影响的程序版本

David Harris Pegasus Mail 4.0 1

- 漏洞讨论

Pegasus Mail is an email client for Microsoft Windows and DOS based systems. A buffer overflow vulnerability has been reported in some versions of Pegasus Mail.

Reportedly, Pegasus is vulnerable to a buffer overflow condition when processing some long message headers. If either the 'To:' or 'From:' message headers are longer than approximately 259 characters, Pegasus may crash when displaying the message.

This issue has been reported in Pegasus Mail 4.01. Earlier versions may share this vulnerability, this has not however been confirmed.

- 漏洞利用

A proof of concept has been provided by Auriemma Luigi &lt;bugtest@sitoverde.com&gt;:

- 解决方案

Upgrade to Pegasus Mail 4.02:


David Harris Pegasus Mail 4.0 1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站