Debian Security Advisory
DSA-449-1 metamail -- buffer overflow, format string bugs
- Date Reported:
- 24 Feb 2004
- Affected Packages:
- metamail
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 9692.
In Mitre's CVE dictionary: CVE-2004-0104, CVE-2004-0105.
CERT's vulnerabilities, advisories and incident notes: VU#518518, VU#513062. - More information:
-
Ulf Härnhammar discovered two format string bugs (CAN-2004-0104) and two buffer overflow bugs (CAN-2004-0105) in metamail, an implementation of MIME. An attacker could create a carefully-crafted mail message which will execute arbitrary code as the victim when it is opened and parsed through metamail.
We have been devoting some effort to trying to avoid shipping metamail in the future. It became unmaintainable and these are probably not the last of the vulnerabilities.
For the stable distribution (woody) these problems have been fixed in version 2.7-45woody.2.
For the unstable distribution (sid) these problems will be fixed in version 2.7-45.2.
We recommend that you upgrade your metamail package.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2.dsc
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2.diff.gz
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7.orig.tar.gz
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/m/metamail/metamail_2.7-45woody.2_sparc.deb
MD5 checksums of the listed files are available in the original advisory.