Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA841] DSA-841-1 mailutils


Vulnerability Assessment Details

[DSA841] DSA-841-1 mailutils

Vulnerability Assessment Summary
DSA-841-1 mailutils

Detailed Explanation for this Vulnerability Assessment

A format string vulnerability has been discovered in GNU mailutils
which contains utilities for handling mail that permits a remote
attacker to execute arbitrary code on the IMAP server.
The old stable distribution (woody) is not affected by this problem.
For the stable distribution (sarge) this problem has been fixed in
version 0.6.1-4sarge1.
For the unstable distribution (sid) this problem has been fixed in
version 0.6.90-3.
We recommend that you upgrade your mailutils package.


Solution : http://www.debian.org/security/2005/dsa-841
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

NEW SEALED AMCC STORAGE 9550SXU-8LP 3WARE 9550SX SATA RAID CONTROLLER la 3c
$69.99
NEW SEALED AMCC STORAGE 9550SXU-8LP 3WARE 9550SX SATA RAID CONTROLLER la  3c pictureSun XTA-3510-CTRL 371-0532 RAID FC Controller 371-0539
$250.0
Sun XTA-3510-CTRL  371-0532 RAID FC Controller 371-0539 pictureIntel RS2BL080 RAID Controller SAS/SATA 6 Gb/s,PCIe MD2 New Retail Box
$399.0
Intel RS2BL080 RAID Controller SAS/SATA 6 Gb/s,PCIe  MD2 New Retail Box pictureHP DL360 G7 64bit VT Server 2x Hexa-Core 3.46GHz / 48GB Ram / 4x 300GB SAS RAID5
$1129.0
HP DL360 G7 64bit VT Server 2x Hexa-Core 3.46GHz / 48GB Ram / 4x 300GB SAS RAID5 picture


Discussions

No Discussions have been posted on this vulnerability.