CVE-2005-1824
CVSS7.5
发布时间 :2005-06-02 00:00:00
修订时间 :2008-09-05 16:50:11
NMCOPS    

[原文]The sql_escape_string function in auth/sql.c for the mailutils SQL authentication module does not properly quote the "\" (backslash) character, which is used as an escape character and makes the module vulnerable to SQL injection attacks.


[CNNVD]GNU Mailutils 认证模块 SQL注入漏洞(CNNVD-200506-026)

        GNU mailutils软件包是一个邮件工具集,包括本地和远程邮箱访问服务。
        GNU Mailutils中存在SQL注入漏洞,成功利用这个漏洞的攻击者可以完全控制基础数据库。
        如果以mysql或postgres USE标记编译GNU Mailutils 的话,认证模块的sql_escape_string函数就无法正确的转义"\"字符,导致SQL命令注入。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1824
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1824
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200506-026
(官方数据源) CNNVD

- 其它链接及资源

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=308031
(VENDOR_ADVISORY)  CONFIRM  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=308031
http://www.gentoo.org/security/en/glsa/glsa-200506-02.xml
(UNKNOWN)  GENTOO  GLSA-200506-02

- 漏洞信息

GNU Mailutils 认证模块 SQL注入漏洞
高危 SQL注入
2005-06-02 00:00:00 2006-09-21 00:00:00
远程  
        GNU mailutils软件包是一个邮件工具集,包括本地和远程邮箱访问服务。
        GNU Mailutils中存在SQL注入漏洞,成功利用这个漏洞的攻击者可以完全控制基础数据库。
        如果以mysql或postgres USE标记编译GNU Mailutils 的话,认证模块的sql_escape_string函数就无法正确的转义"\"字符,导致SQL命令注入。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://security.gentoo.org/glsa/glsa-200506-02.xml

- 漏洞信息 (F38116)

Gentoo Linux Security Advisory 200506-2 (PacketStormID:F38116)
2005-06-18 00:00:00
Gentoo  security.gentoo.org
advisory
linux,gentoo
CVE-2005-1824
[点击下载]

Gentoo Linux Security Advisory GLSA 200506-02 - When GNU Mailutils is built with the mysql or postgres USE flag, the sql_escape_string function of the authentication module fails to properly escape the \ character, rendering it vulnerable to a SQL command injection. Versions less than 0.6-r1 are affected.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200506-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: Mailutils: SQL Injection
      Date: June 06, 2005
      Bugs: #94824
        ID: 200506-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

GNU Mailutils is vulnerable to SQL command injection attacks.

Background
==========

GNU Mailutils is a collection of mail-related utilities.

Affected packages
=================

    -------------------------------------------------------------------
     Package             /  Vulnerable  /                   Unaffected
    -------------------------------------------------------------------
  1  net-mail/mailutils      < 0.6-r1                        >= 0.6-r1

Description
===========

When GNU Mailutils is built with the "mysql" or "postgres" USE flag,
the sql_escape_string function of the authentication module fails to
properly escape the "\" character, rendering it vulnerable to a SQL
command injection.

Impact
======

A malicious remote user could exploit this vulnerability to inject SQL
commands to the underlying database.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All GNU Mailutils users should upgrade to the latest available version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-mail/mailutils-0.6-r1"

References
==========

  [ 1 ] CAN-2005-1824
        http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1824

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200506-02.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

    

- 漏洞信息

17105
GNU Mailutils Authentication Module sql_escape_string() SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-05-15 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

GNU Mailutils Authentication Module SQL Injection Vulnerability
Input Validation Error 13870
Yes No
2005-06-06 12:00:00 2009-07-12 02:56:00
The discoverer of this vulnerability is unknown at this time, this vulnerability was announced by Gentoo.

- 受影响的程序版本

GNU Mailutils 0.6.90
GNU Mailutils 0.6
+ Gentoo Linux
GNU Mailutils 0.5
Gentoo Linux

- 漏洞讨论

GNU Mailutils is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

- 漏洞利用

No exploit is required.

- 解决方案

Gentoo has released advisory GLSA 200506-02 to address this issue. Gentoo recommends all GNU Mailutils users should upgrade to the latest available version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/mailutils-0.6-r1"

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站