1.2
CVSSv2

CVE-2004-0880

Published: 27/01/2005 Updated: 11/07/2017
CVSS v2 Base Score: 1.2 | Impact Score: 2.9 | Exploitability Score: 1.9
VMScore: 107
Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Summary

getmail 4.x prior to 4.2.0, when run as root, allows local users to overwrite arbitrary files via a symlink attack on an mbox file.

Vulnerable Product Search on Vulmon Subscribe to Product

getmail getmail 3.x

getmail getmail 4.0

getmail getmail 4.0.2

getmail getmail 4.0.3

getmail getmail 2.3.7

getmail getmail 4.0.12

getmail getmail 4.0.13

getmail getmail 4.0.9

getmail getmail 4.1

getmail getmail 4.0.0_b10

getmail getmail 4.0.1

getmail getmail 4.0.4

getmail getmail 4.0.5

getmail getmail 4.1.3

getmail getmail 4.1.4

getmail getmail 4.1.1

getmail getmail 4.1.2

getmail getmail 4.0.10

getmail getmail 4.0.11

getmail getmail 4.0.6

getmail getmail 4.0.7

getmail getmail 4.0.8

getmail getmail 4.1.5

gentoo linux 1.4

slackware slackware linux 10.0

slackware slackware linux 9.1

slackware slackware linux current

Vendor Advisories

A security problem has been discovered in getmail, a POP3 and APOP mail gatherer and forwarder An attacker with a shell account on the victims host could utilise getmail to overwrite arbitrary files when it is running as root For the stable distribution (woody) this problem has been fixed in version 237-2 For the unstable distribution (sid) th ...