2.1
CVSSv2

CVE-2004-0881

Published: 27/01/2005 Updated: 11/07/2017
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

getmail 4.x prior to 4.2.0, and other versions prior to 3.2.5, when run as root, allows local users to write files in arbitrary directories via a symlink attack on subdirectories in the maildir.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

getmail getmail 4.0.0_b10

getmail getmail 4.0.1

getmail getmail 4.0.5

getmail getmail 4.0.6

getmail getmail 4.1.3

getmail getmail 4.1.4

getmail getmail 2.3.7

getmail getmail 4.0.12

getmail getmail 4.0.13

getmail getmail 4.0.2

getmail getmail 4.0.9

getmail getmail 4.1

getmail getmail 4.0.10

getmail getmail 4.0.11

getmail getmail 4.0.7

getmail getmail 4.0.8

getmail getmail 4.1.5

getmail getmail 3.x

getmail getmail 4.0

getmail getmail 4.0.3

getmail getmail 4.0.4

getmail getmail 4.1.1

getmail getmail 4.1.2

gentoo linux 1.4

slackware slackware linux 10.0

slackware slackware linux 9.1

slackware slackware linux current

Vendor Advisories

A security problem has been discovered in getmail, a POP3 and APOP mail gatherer and forwarder An attacker with a shell account on the victims host could utilise getmail to overwrite arbitrary files when it is running as root For the stable distribution (woody) this problem has been fixed in version 237-2 For the unstable distribution (sid) th ...