CVE-2003-0140
CVSS7.5
发布时间 :2003-03-24 00:00:00
修订时间 :2016-10-17 22:30:01
NMCOS    

[原文]Buffer overflow in Mutt 1.4.0 and possibly earlier versions, 1.5.x up to 1.5.3, and other programs that use Mutt code such as Balsa before 2.0.10, allows a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a crafted folder.


[CNNVD]Mutt UTF-7 Internationalized远程文件夹缓冲区溢出漏洞(CNNVD-200303-068)

        Mutt 1.4.0可能还包括更早版本,1.5.x到1.5.3版本以及其他使用Mutt代码如Balsa 2.0.10之前版本的程序存在缓冲区溢出漏洞。远程恶意IMAP服务器可以借助一个畸形文件夹导致服务拒绝(崩溃),并且可能还可以执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:mutt:mutt:1.3.24
cpe:/a:mutt:mutt:1.3.25
cpe:/a:mutt:mutt:1.3.22
cpe:/a:mutt:mutt:1.5.3
cpe:/a:mutt:mutt:1.3.12
cpe:/a:mutt:mutt:1.3.17
cpe:/a:mutt:mutt:1.4.0
cpe:/a:mutt:mutt:1.3.16
cpe:/a:mutt:mutt:1.3.27

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:434Mutt BO Vulnerability
oval:org.mitre.oval:def:2Mutt BO Vulnerability in balsa
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0140
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0140
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200303-068
(官方数据源) CNNVD

- 其它链接及资源

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000626
(UNKNOWN)  CONECTIVA  CLA-2003:626
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000630
(UNKNOWN)  CONECTIVA  CLA-2003:630
http://marc.info/?l=bugtraq&m=104817995421439&w=2
(UNKNOWN)  BUGTRAQ  20030320 [OpenPKG-SA-2003.025] OpenPKG Security Advisory (mutt)
http://marc.info/?l=bugtraq&m=104818814931378&w=2
(UNKNOWN)  BUGTRAQ  20030320 CORE-20030304-02: Vulnerability in Mutt Mail User Agent
http://marc.info/?l=bugtraq&m=104852190605988&w=2
(UNKNOWN)  BUGTRAQ  20030322 GLSA: mutt (200303-19)
http://marc.info/?l=bugtraq&m=105171507629573&w=2
(UNKNOWN)  BUGTRAQ  20030430 GLSA: balsa (200304-10)
http://www.coresecurity.com/common/showdoc.php?idx=310&idxseccion=10
(UNKNOWN)  MISC  http://www.coresecurity.com/common/showdoc.php?idx=310&idxseccion=10
http://www.debian.org/security/2003/dsa-268
(UNKNOWN)  DEBIAN  DSA-268
http://www.gentoo.org/security/en/glsa/glsa-200303-19.xml
(UNKNOWN)  GENTOO  GLSA-200303-19
http://www.mandriva.com/security/advisories?name=MDKSA-2003:041
(UNKNOWN)  MANDRAKE  MDKSA-2003:041
http://www.novell.com/linux/security/advisories/2003_020_mutt.html
(UNKNOWN)  SUSE  SuSE-SA:2003:020
http://www.redhat.com/support/errata/RHSA-2003-109.html
(UNKNOWN)  REDHAT  RHSA-2003:109
http://www.securityfocus.com/archive/1/315679
(VENDOR_ADVISORY)  BUGTRAQ  20030319 mutt-1.4.1 fixes a buffer overflow.
http://www.securityfocus.com/bid/7120
(VENDOR_ADVISORY)  BID  7120
http://xforce.iss.net/xforce/xfdb/11583
(VENDOR_ADVISORY)  XF  mutt-folder-name-bo(11583)

- 漏洞信息

Mutt UTF-7 Internationalized远程文件夹缓冲区溢出漏洞
高危 缓冲区溢出
2003-03-24 00:00:00 2005-10-20 00:00:00
远程  
        Mutt 1.4.0可能还包括更早版本,1.5.x到1.5.3版本以及其他使用Mutt代码如Balsa 2.0.10之前版本的程序存在缓冲区溢出漏洞。远程恶意IMAP服务器可以借助一个畸形文件夹导致服务拒绝(崩溃),并且可能还可以执行任意代码。

- 公告与补丁

        Conectiva has released an additional advisory CLA-2003:635 that contains fixes to address this issue in Balsa.
        Users are advised to upgrade to version 1.4.1 (stable). The patched unstable version is 1.5.4.
        OpenPKG has made fixed versions available, and released advisory OpenPKG-SA-2003.025 to address this issue.
        Slackware has released fixes for this issue. Users are advised to upgrade to mutt-1.4.1i.
        Gentoo Linux has addressed this issue in advisory 200303-19. Affected users have been advised to issue the following commands to upgrade the vulnerable package:
        emerge sync
        emerge mutt
        emerge clean
        Red Hat Linux has released an advisory (RHSA-2003:109-03). Information about obtaining and applying fixes are available in the referenced advisory.
        Conectiva has released advisory CLA-2003:626 to address this issue. An additional advisory has been released (CLA-2003:630) which contains fixes which address this issue in Balsa.
        Gentoo Linux has released a new advisory. Users who have installed net-mail/balsa are advised to upgrade to balsa-2.0.10 by issuing the following commands:
        emerge sync
        emerge balsa
        emerge clean
        Red Hat has also released an advisory (RHSA-2003:111-08) which contains upgrade details for Enterprise distributions, which are available through the Red Hat Network.
        GNOME Balsa 1.2.4
        
        Mutt Mutt 1.3.12
        
        Mutt Mutt 1.3.16
        
        Mutt Mutt 1.3.17
        
        Mutt Mutt 1.3.22
        
        Mutt Mutt 1.3.24
        
        Mutt Mutt 1.3.25
        
        Mutt Mutt 1.3.27
        
        Mutt Mutt 1.3.28
        

- 漏洞信息

13398
Mutt IMAP Server Crafted Folder Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-03-20 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Mutt UTF-7 Internationalized Remote Folder Buffer Overrun Vulnerability
Boundary Condition Error 7120
Yes No
2003-03-17 12:00:00 2009-07-11 09:06:00
Discovered by Diego Kelyacoubian, Javier Kohen, Alberto Solino, and Juan Vera of Core Security Technologies.

- 受影响的程序版本

RedHat Linux Advanced Work Station 2.1
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 2.1
Red Hat Enterprise Linux AS 2.1
Mutt Mutt 1.5.3
Mutt Mutt 1.4 .0
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ Mandriva Linux Mandrake 9.0
+ Netwosix Netwosix Linux 1.0
+ OpenPKG OpenPKG 1.2
+ OpenPKG OpenPKG 1.1
+ OpenPKG OpenPKG Current
+ RedHat Linux 8.0 i686
+ RedHat Linux 8.0 i386
+ RedHat Linux 8.0
+ S.u.S.E. Linux 8.1
Mutt Mutt 1.3.28
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
Mutt Mutt 1.3.27
+ S.u.S.E. Linux 8.0 i386
+ S.u.S.E. Linux 8.0
Mutt Mutt 1.3.25
Mutt Mutt 1.3.24
Mutt Mutt 1.3.22
+ S.u.S.E. Linux 7.3 sparc
+ S.u.S.E. Linux 7.3 ppc
+ S.u.S.E. Linux 7.3 i386
+ S.u.S.E. Linux 7.3
Mutt Mutt 1.3.17
+ Conectiva Linux 7.0
Mutt Mutt 1.3.16
+ S.u.S.E. Linux 7.2 i386
+ S.u.S.E. Linux 7.2
Mutt Mutt 1.3.12
+ S.u.S.E. Linux 7.1 x86
+ S.u.S.E. Linux 7.1 sparc
+ S.u.S.E. Linux 7.1 ppc
+ S.u.S.E. Linux 7.1 alpha
GNOME Balsa 1.2.4
+ Conectiva Linux 8.0
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ RedHat Linux 8.0 i686
+ RedHat Linux 8.0 i386
+ RedHat Linux 8.0
+ RedHat Linux 7.3 i686
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ Sun Linux 5.0
Mutt Mutt 1.5.4
Mutt Mutt 1.4.1
+ Slackware Linux 9.1
+ Slackware Linux 9.0
+ Slackware Linux 8.1
+ Trustix Secure Linux 2.0

- 不受影响的程序版本

Mutt Mutt 1.5.4
Mutt Mutt 1.4.1
+ Slackware Linux 9.1
+ Slackware Linux 9.0
+ Slackware Linux 8.1
+ Trustix Secure Linux 2.0

- 漏洞讨论

It has been reported that Mutt does not properly handle remote internationalized folders. Because of this, it is possible for a malicious server to launch an attack that could result in the execution of code as the mutt user.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Conectiva has released an additional advisory CLA-2003:635 that contains fixes to address this issue in Balsa.

Users are advised to upgrade to version 1.4.1 (stable). The patched unstable version is 1.5.4.

OpenPKG has made fixed versions available, and released advisory OpenPKG-SA-2003.025 to address this issue.

Slackware has released fixes for this issue. Users are advised to upgrade to mutt-1.4.1i.

Gentoo Linux has addressed this issue in advisory 200303-19. Affected users have been advised to issue the following commands to upgrade the vulnerable package:

emerge sync
emerge mutt
emerge clean

Red Hat Linux has released an advisory (RHSA-2003:109-03). Information about obtaining and applying fixes are available in the referenced advisory.

Conectiva has released advisory CLA-2003:626 to address this issue. An additional advisory has been released (CLA-2003:630) which contains fixes which address this issue in Balsa.

Gentoo Linux has released a new advisory. Users who have installed net-mail/balsa are advised to upgrade to balsa-2.0.10 by issuing the following commands:

emerge sync
emerge balsa
emerge clean

Red Hat has also released an advisory (RHSA-2003:111-08) which contains upgrade details for Enterprise distributions, which are available through the Red Hat Network.


GNOME Balsa 1.2.4

Mutt Mutt 1.3.12

Mutt Mutt 1.3.16

Mutt Mutt 1.3.17

Mutt Mutt 1.3.22

Mutt Mutt 1.3.24

Mutt Mutt 1.3.25

Mutt Mutt 1.3.27

Mutt Mutt 1.3.28

Mutt Mutt 1.4 .0

Mutt Mutt 1.5.3

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站