DSA-732-1 mailutils -- several vulnerabilities

Related Vulnerabilities: CVE-2005-1520   CVE-2005-1521   CVE-2005-1522   CVE-2005-1523  

"infamous41md" discovered several vulnerabilities in the GNU mailutils package which contains utilities for handling mail. These problems can lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities. CAN-2005-1520 Buffer overflow mail header handling may allow a remote attacker to execute commands with the privileges of the targeted user. CAN-2005-1521 Combined integer and heap overflow in the fetch routine can lead to the execution of arbitrary code. CAN-2005-1522 Denial of service in the fetch routine. CAN-2005-1523 Format string vulnerability can lead to the execution of arbitrary code. For the stable distribution (woody) these problems have been fixed in version 20020409-1woody2. For the testing distribution (sarge) these problems have been fixed in version 0.6.1-4. For the unstable distribution (sid) these problems have been fixed in version 0.6.1-4. We recommend that you upgrade your mailutils packages.

Debian Security Advisory

DSA-732-1 mailutils -- several vulnerabilities

Date Reported:
03 Jun 2005
Affected Packages:
mailutils
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2005-1520, CVE-2005-1521, CVE-2005-1522, CVE-2005-1523.
More information:

"infamous41md" discovered several vulnerabilities in the GNU mailutils package which contains utilities for handling mail. These problems can lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities.

  • CAN-2005-1520

    Buffer overflow mail header handling may allow a remote attacker to execute commands with the privileges of the targeted user.

  • CAN-2005-1521

    Combined integer and heap overflow in the fetch routine can lead to the execution of arbitrary code.

  • CAN-2005-1522

    Denial of service in the fetch routine.

  • CAN-2005-1523

    Format string vulnerability can lead to the execution of arbitrary code.

For the stable distribution (woody) these problems have been fixed in version 20020409-1woody2.

For the testing distribution (sarge) these problems have been fixed in version 0.6.1-4.

For the unstable distribution (sid) these problems have been fixed in version 0.6.1-4.

We recommend that you upgrade your mailutils packages.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2.dsc
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-doc_20020409-1woody2_all.deb
Alpha:
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_20020409-1woody2_alpha.deb
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_20020409-1woody2_alpha.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2_alpha.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_20020409-1woody2_alpha.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_20020409-1woody2_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_20020409-1woody2_arm.deb
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_20020409-1woody2_arm.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2_arm.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_20020409-1woody2_arm.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_20020409-1woody2_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_20020409-1woody2_i386.deb
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_20020409-1woody2_i386.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2_i386.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_20020409-1woody2_i386.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_20020409-1woody2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_20020409-1woody2_ia64.deb
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_20020409-1woody2_ia64.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2_ia64.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_20020409-1woody2_ia64.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_20020409-1woody2_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_20020409-1woody2_hppa.deb
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_20020409-1woody2_hppa.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2_hppa.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_20020409-1woody2_hppa.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_20020409-1woody2_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_20020409-1woody2_m68k.deb
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_20020409-1woody2_m68k.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2_m68k.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_20020409-1woody2_m68k.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_20020409-1woody2_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_20020409-1woody2_mips.deb
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_20020409-1woody2_mips.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2_mips.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_20020409-1woody2_mips.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_20020409-1woody2_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_20020409-1woody2_mipsel.deb
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_20020409-1woody2_mipsel.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2_mipsel.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_20020409-1woody2_mipsel.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_20020409-1woody2_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_20020409-1woody2_powerpc.deb
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_20020409-1woody2_powerpc.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2_powerpc.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_20020409-1woody2_powerpc.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_20020409-1woody2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_20020409-1woody2_s390.deb
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_20020409-1woody2_s390.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2_s390.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_20020409-1woody2_s390.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_20020409-1woody2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_20020409-1woody2_sparc.deb
http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_20020409-1woody2_sparc.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils_20020409-1woody2_sparc.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_20020409-1woody2_sparc.deb
http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_20020409-1woody2_sparc.deb

MD5 checksums of the listed files are available in the original advisory.