Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-02403

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 10
EPSS Низкий

Описание

Множественные уязвимости пакета uw-mailutils операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 4 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Критический уровень опасности (базовая оценка CVSS 2.0 составляет 10)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 4:
ppc:
uw-mailutils - 2002edebian1-13.1+etch1
uw-imapd - 2002edebian1-13.1+etch1
libc-client2002edebian - 2002edebian1-13.1+etch1
mlock - 2002edebian1-13.1+etch1
ipopd - 2002edebian1-13.1+etch1
libc-client-dev - 2002edebian1-13.1+etch1
s390x:
libc-client2002edebian - 2002edebian1-13.1+etch1
uw-imapd - 2002edebian1-13.1+etch1
mlock - 2002edebian1-13.1+etch1
ipopd - 2002edebian1-13.1+etch1
uw-mailutils - 2002edebian1-13.1+etch1
libc-client-dev - 2002edebian1-13.1+etch1
i686:
mlock - 2002edebian1-13.1+etch1
uw-mailutils - 2002edebian1-13.1+etch1
uw-imapd - 2002edebian1-13.1+etch1
libc-client-dev - 2002edebian1-13.1+etch1
libc-client2002edebian - 2002edebian1-13.1+etch1
ipopd - 2002edebian1-13.1+etch1
hppa:
uw-mailutils - 2002edebian1-13.1+etch1
mlock - 2002edebian1-13.1+etch1
ipopd - 2002edebian1-13.1+etch1
uw-imapd - 2002edebian1-13.1+etch1
libc-client-dev - 2002edebian1-13.1+etch1
libc-client2002edebian - 2002edebian1-13.1+etch1
sparc:
uw-mailutils - 2002edebian1-13.1+etch1
ipopd - 2002edebian1-13.1+etch1
libc-client-dev - 2002edebian1-13.1+etch1
mlock - 2002edebian1-13.1+etch1
libc-client2002edebian - 2002edebian1-13.1+etch1
uw-imapd - 2002edebian1-13.1+etch1
x86-64:
libc-client-dev - 2002edebian1-13.1+etch1
uw-imapd - 2002edebian1-13.1+etch1
uw-mailutils - 2002edebian1-13.1+etch1
libc-client2002edebian - 2002edebian1-13.1+etch1
ipopd - 2002edebian1-13.1+etch1
mlock - 2002edebian1-13.1+etch1
alpha:
uw-mailutils - 2002edebian1-13.1+etch1
libc-client2002edebian - 2002edebian1-13.1+etch1
ipopd - 2002edebian1-13.1+etch1
mlock - 2002edebian1-13.1+etch1
uw-imapd - 2002edebian1-13.1+etch1
libc-client-dev - 2002edebian1-13.1+etch1
ia64:
ipopd - 2002edebian1-13.1+etch1
uw-imapd - 2002edebian1-13.1+etch1
libc-client-dev - 2002edebian1-13.1+etch1
mlock - 2002edebian1-13.1+etch1
uw-mailutils - 2002edebian1-13.1+etch1
libc-client2002edebian - 2002edebian1-13.1+etch1
mips:
libc-client-dev - 2002edebian1-13.1+etch1
uw-imapd - 2002edebian1-13.1+etch1
uw-mailutils - 2002edebian1-13.1+etch1
ipopd - 2002edebian1-13.1+etch1
libc-client2002edebian - 2002edebian1-13.1+etch1
mlock - 2002edebian1-13.1+etch1
noarch:
ipopd-ssl - 2002edebian1-13.1+etch1
uw-imapd-ssl - 2002edebian1-13.1+etch1
mipsel:
mlock - 2002edebian1-13.1+etch1
uw-imapd - 2002edebian1-13.1+etch1
libc-client-dev - 2002edebian1-13.1+etch1
uw-mailutils - 2002edebian1-13.1+etch1
libc-client2002edebian - 2002edebian1-13.1+etch1
ipopd - 2002edebian1-13.1+etch1
arm:
uw-mailutils - 2002edebian1-13.1+etch1
uw-imapd - 2002edebian1-13.1+etch1
libc-client-dev - 2002edebian1-13.1+etch1
libc-client2002edebian - 2002edebian1-13.1+etch1
mlock - 2002edebian1-13.1+etch1
ipopd - 2002edebian1-13.1+etch1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

EPSS

Процентиль: 90%
0.06194
Низкий

10 Critical

CVSS2

Связанные уязвимости

ubuntu
около 17 лет назад

Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.

redhat
около 17 лет назад

Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.

nvd
около 17 лет назад

Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.

debian
около 17 лет назад

Multiple stack-based buffer overflows in (1) University of Washington ...

github
больше 3 лет назад

Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.

EPSS

Процентиль: 90%
0.06194
Низкий

10 Critical

CVSS2